Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-5707 (GCVE-0-2015-5707)
Vulnerability from cvelistv5
Published
2015-10-19 10:00
Modified
2024-08-06 06:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:04.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2738-1" }, { "name": "SUSE-SU-2015:2089", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" }, { "name": "USN-2733-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2733-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "name": "SUSE-SU-2015:2087", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" }, { "name": "USN-2750-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2750-1" }, { "name": "USN-2737-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2737-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2017-07-01" }, { "name": "SUSE-SU-2015:1611", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" }, { "name": "DSA-3329", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3329" }, { "name": "1033521", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033521" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "USN-2760-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2760-1" }, { "name": "SUSE-SU-2015:2091", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" }, { "name": "SUSE-SU-2015:1478", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" }, { "name": "USN-2759-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2759-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "SUSE-SU-2015:2084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" }, { "name": "SUSE-SU-2015:2085", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" }, { "name": "USN-2734-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2734-1" }, { "name": "[oss-security] 20150801 CVE request: Integer overflow in SCSI generic driver in Linux \u003c4.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/01/6" }, { "name": "SUSE-SU-2015:2086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" }, { "name": "SUSE-SU-2015:1592", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" }, { "name": "SUSE-SU-2015:2090", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" }, { "name": "76145", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76145" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-16T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-2738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2738-1" }, { "name": "SUSE-SU-2015:2089", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" }, { "name": "USN-2733-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2733-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "name": "SUSE-SU-2015:2087", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" }, { "name": "USN-2750-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2750-1" }, { "name": "USN-2737-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2737-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2017-07-01" }, { "name": "SUSE-SU-2015:1611", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" }, { "name": "DSA-3329", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3329" }, { "name": "1033521", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033521" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "USN-2760-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2760-1" }, { "name": "SUSE-SU-2015:2091", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" }, { "name": "SUSE-SU-2015:1478", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" }, { "name": "USN-2759-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2759-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "SUSE-SU-2015:2084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" }, { "name": "SUSE-SU-2015:2085", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" }, { "name": "USN-2734-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2734-1" }, { "name": "[oss-security] 20150801 CVE request: Integer overflow in SCSI generic driver in Linux \u003c4.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/01/6" }, { "name": "SUSE-SU-2015:2086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" }, { "name": "SUSE-SU-2015:1592", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" }, { "name": "SUSE-SU-2015:2090", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" }, { "name": "76145", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76145" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2738-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2738-1" }, { "name": "SUSE-SU-2015:2089", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" }, { "name": "USN-2733-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2733-1" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "name": "SUSE-SU-2015:2087", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" }, { "name": "USN-2750-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2750-1" }, { "name": "USN-2737-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2737-1" }, { "name": "https://source.android.com/security/bulletin/2017-07-01", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2017-07-01" }, { "name": "SUSE-SU-2015:1611", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" }, { "name": "DSA-3329", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3329" }, { "name": "1033521", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033521" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030" }, { "name": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "USN-2760-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2760-1" }, { "name": "SUSE-SU-2015:2091", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" }, { "name": "SUSE-SU-2015:1478", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" }, { "name": "USN-2759-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2759-1" }, { "name": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "SUSE-SU-2015:2084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" }, { "name": "SUSE-SU-2015:2085", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" }, { "name": "USN-2734-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2734-1" }, { "name": "[oss-security] 20150801 CVE request: Integer overflow in SCSI generic driver in Linux \u003c4.1", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/01/6" }, { "name": "SUSE-SU-2015:2086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" }, { "name": "SUSE-SU-2015:1592", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" }, { "name": "SUSE-SU-2015:2090", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" }, { "name": "76145", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76145" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5707", "datePublished": "2015-10-19T10:00:00", "dateReserved": "2015-08-02T00:00:00", "dateUpdated": "2024-08-06T06:59:04.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-5707\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-10-19T10:59:05.037\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de entero en la funci\u00f3n sg_start_req en drivers/scsi/sg.c en el kernel de Linux 2.6.x hasta la versi\u00f3n 4.x en versiones anteriores a 4.1 permite a usuarios locales provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de un valor iov_count grande en una petici\u00f3n de escritura.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.0\",\"versionEndExcluding\":\"4.1.0\",\"matchCriteriaId\":\"4884A404-34BE-4D52-B749-219701AF2BC2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38D3B7E-8429-473F-BB31-FC3583EE5A5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4BC592E-17CC-4DD4-8B2C-CFD99383649C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"C202F75B-221A-40BB-8A0D-451335B39937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD4BBD63-E038-45CE-9537-D96831E99A06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*\",\"matchCriteriaId\":\"0EA03350-8702-43D5-8605-5FB765A3F60B\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3329\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/08/01/6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/76145\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1033521\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2733-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2734-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2737-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2738-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2750-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2759-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2760-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1250030\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2017-07-01\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3329\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/08/01/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/76145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1033521\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2733-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2734-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2737-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2738-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2750-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2759-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2760-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1250030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2017-07-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2016:0585-1
Vulnerability from csaf_suse
Published
2016-02-25 16:23
Modified
2016-02-25 16:23
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.53 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).
- CVE-2015-5707: Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request (bnc#940338).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that was (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).
- CVE-2015-8550: Optimizations introduced by the compiler could have lead to double fetch vulnerabilities, potentially possibly leading to arbitrary code execution in backend (bsc#957988).
- CVE-2015-8551: Xen PCI backend driver did not perform proper sanity checks on the device's state, allowing for DoS (bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).
- CVE-2015-8660: The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel attempted to merge distinct setattr operations, which allowed local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application (bnc#960281).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).
- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: A race in invalidating paging structures that were not in use locally could have lead to disclosoure of information or arbitrary code exectution (bnc#963767).
The following non-security bugs were fixed:
- ACPI: Introduce apic_id in struct processor to save parsed APIC id (bsc#959463).
- ACPI: Make it possible to get local x2apic id via _MAT (bsc#959463).
- ACPI: use apic_id and remove duplicated _MAT evaluation (bsc#959463).
- ACPICA: Correctly cleanup after a ACPI table load failure (bnc#937261).
- Add sd_mod to initrd modules. For some reason PowerVM backend can't work without sd_mod
- Do not modify perf bias performance setting by default at boot (bnc#812259, bsc#959629).
- Documentation: Document kernel.panic_on_io_nmi sysctl (bsc#940946, bsc#937444).
- Driver for IBM System i/p VNIC protocol
- Drop blktap patches from SLE12, since the driver is unsupported
- Improve fairness when locking the per-superblock s_anon list (bsc#957525, bsc#941363).
- Input: aiptek - fix crash on detecting device without endpoints (bnc#956708).
- NFSD: Do not start lockd when only NFSv4 is running
- NFSv4: Recovery of recalled read delegations is broken (bsc#956514).
- Replace with 176bed1d vmstat: explicitly schedule per-cpu work on the CPU we need it to run on
- Revert 'ipv6: add complete rcu protection around np->opt' (bnc#961257).
- Revert 874bbfe60 workqueue: make sure delayed work run in local cpu 1. Without 22b886dd, 874bbfe60 leads to timer corruption. 2. With 22b886dd applied, victim of 1 reports performance regression (1,2 https://lkml.org/lkml/2016/2/4/618) 3. Leads to scheduling work to offlined CPU (bnc#959463). SLERT: 4. NO_HZ_FULL regressession, unbound delayed work timer is no longer deflected to a housekeeper CPU.
- be2net: fix some log messages (bnc#855062, bnc#867583).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#902606).
- block: Always check queue limits for cloned requests (bsc#902606).
- bnx2x: Add new device ids under the Qlogic vendor (bnc#964821).
- btrfs: Add qgroup tracing (bnc#935087, bnc#945649).
- btrfs: Update btrfs qgroup status item when rescan is done (bnc#960300).
- btrfs: backref: Add special time_seq == (u64)-1 case for btrfs_find_all_roots() (bnc#935087, bnc#945649).
- btrfs: backref: Do not merge refs which are not for same block (bnc#935087, bnc#945649).
- btrfs: delayed-ref: Cleanup the unneeded functions (bnc#935087, bnc#945649).
- btrfs: delayed-ref: Use list to replace the ref_root in ref_head (bnc#935087, bnc#945649).
- btrfs: extent-tree: Use ref_node to replace unneeded parameters in __inc_extent_ref() and __free_extent() (bnc#935087, bnc#945649).
- btrfs: fix comp_oper to get right order (bnc#935087, bnc#945649).
- btrfs: fix deadlock between direct IO write and defrag/readpages (bnc#965344).
- btrfs: fix leak in qgroup_subtree_accounting() error path (bnc#935087, bnc#945649).
- btrfs: fix order by which delayed references are run (bnc#949440).
- btrfs: fix qgroup sanity tests (bnc#951615).
- btrfs: fix race waiting for qgroup rescan worker (bnc#960300).
- btrfs: fix regression running delayed references when using qgroups (bnc#951615).
- btrfs: fix regression when running delayed references (bnc#951615).
- btrfs: fix sleeping inside atomic context in qgroup rescan worker (bnc#960300).
- btrfs: keep dropped roots in cache until transaction commit (bnc#935087, bnc#945649).
- btrfs: qgroup: Add function qgroup_update_counters() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add function qgroup_update_refcnt() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add new function to record old_roots (bnc#935087, bnc#945649).
- btrfs: qgroup: Add new qgroup calculation function btrfs_qgroup_account_extents() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add the ability to skip given qgroup for old/new_roots (bnc#935087, bnc#945649).
- btrfs: qgroup: Cleanup open-coded old/new_refcnt update and read (bnc#935087, bnc#945649).
- btrfs: qgroup: Cleanup the old ref_node-oriented mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Do not copy extent buffer to do qgroup rescan (bnc#960300).
- btrfs: qgroup: Fix a regression in qgroup reserved space (bnc#935087, bnc#945649).
- btrfs: qgroup: Make snapshot accounting work with new extent-oriented qgroup (bnc#935087, bnc#945649).
- btrfs: qgroup: Record possible quota-related extent for qgroup (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch rescan to new mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch self test to extent-oriented qgroup mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch to new extent-oriented qgroup mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: account shared subtree during snapshot delete (bnc#935087, bnc#945649).
- btrfs: qgroup: clear STATUS_FLAG_ON in disabling quota (bnc#960300).
- btrfs: qgroup: exit the rescan worker during umount (bnc#960300).
- btrfs: qgroup: fix quota disable during rescan (bnc#960300).
- btrfs: qgroup: move WARN_ON() to the correct location (bnc#935087, bnc#945649).
- btrfs: remove transaction from send (bnc#935087, bnc#945649).
- btrfs: skip locking when searching commit root (bnc#963825).
- btrfs: ulist: Add ulist_del() function (bnc#935087, bnc#945649).
- btrfs: use btrfs_get_fs_root in resolve_indirect_ref (bnc#935087, bnc#945649).
- crypto: nx - use common code for both NX decompress success cases (bsc#942476).
- crypto: nx-842 - Mask XERS0 bit in return value (bsc#960221).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- drivers/firmware/memmap.c: do not allocate firmware_map_entry of same memory range (bsc#959463).
- drivers/firmware/memmap.c: do not create memmap sysfs of same firmware_map_entry (bsc#959463).
- drivers/firmware/memmap.c: pass the correct argument to firmware_map_find_entry_bootmem() (bsc#959463).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- fuse: break infinite loop in fuse_fill_write_pages() (bsc#963765).
- group-source-files: mark module.lds as devel file ld: cannot open linker script file /usr/src/linux-4.2.5-1/arch/arm/kernel/module.lds: No such file or directory
- ipv6: fix tunnel error handling (bsc#952579).
- jbd2: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kABI: reintroduce blk_rq_check_limits.
- kabi: protect struct acpi_processor signature (bsc#959463).
- kernel/watchdog.c: perform all-CPU backtrace in case of hard lockup (bsc#940946, bsc#937444).
- kernel: Change ASSIGN_ONCE(val, x) to WRITE_ONCE(x, val) (bsc#940946, bsc#937444).
- kernel: Provide READ_ONCE and ASSIGN_ONCE (bsc#940946, bsc#937444).
- kernel: inadvertent free of the vector register save area (bnc#961202).
- kexec: Fix race between panic() and crash_kexec() (bsc#940946, bsc#937444).
- kgr: Remove the confusing search for fentry
- kgr: Safe way to avoid an infinite redirection
- kgr: do not print error for !abort_if_missing symbols (bnc#943989).
- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
- kgr: log when modifying kernel
- kgr: mark some more missed kthreads (bnc#962336).
- kgr: usb/storage: do not emit thread awakened (bnc#899908).
- kvm: Add arch specific mmu notifier for page invalidation (bsc#959463).
- kvm: Make init_rmode_identity_map() return 0 on success (bsc#959463).
- kvm: Remove ept_identity_pagetable from struct kvm_arch (bsc#959463).
- kvm: Rename make_all_cpus_request() to kvm_make_all_cpus_request() and make it non-static (bsc#959463).
- kvm: Use APIC_DEFAULT_PHYS_BASE macro as the apic access page address (bsc#959463).
- kvm: vmx: Implement set_apic_access_page_addr (bsc#959463).
- kvm: x86: Add request bit to reload APIC access page address (bsc#959463).
- kvm: x86: Unpin and remove kvm_arch->apic_access_page (bsc#959463).
- libiscsi: Fix host busy blocking during connection teardown.
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- md/bitmap: do not pass -1 to bitmap_storage_alloc (bsc#955118).
- md/bitmap: remove confusing code from filemap_get_page.
- md/bitmap: remove rcu annotation from pointer arithmetic.
- mem-hotplug: reset node managed pages when hot-adding a new pgdat (bsc#959463).
- mem-hotplug: reset node present pages when hot-adding a new pgdat (bsc#959463).
- memory-hotplug: clear pgdat which is allocated by bootmem in try_offline_node() (bsc#959463).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (VM Functionality, bnc#961588).
- mm/mempolicy.c: convert the shared_policy lock to a rwlock (VM Performance, bnc#959436).
- module: keep percpu symbols in module's symtab (bsc#962788).
- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).
- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- panic, x86: Allow CPUs to save registers even if looping in NMI context (bsc#940946, bsc#937444).
- panic, x86: Fix re-entrance problem due to panic on NMI (bsc#940946, bsc#937444).
- pci: Check for valid tags when calculating the VPD size (bsc#959146).
- qeth: initialize net_device with carrier off (bnc#964230).
- rpm/constraints.in: Bump disk space requirements up a bit Require 10GB on s390x, 20GB elsewhere.
- rpm/kernel-binary.spec.in: Fix build if no UEFI certs are installed
- rpm/kernel-binary.spec.in: Fix kernel-vanilla-devel dependency (bsc#959090)
- rpm/kernel-binary.spec.in: Fix paths in kernel-vanilla-devel (bsc#959090).
- rpm/kernel-binary.spec.in: Install libopenssl-devel for newer sign-file
- rpm/kernel-binary.spec.in: Use bzip compression to speed up build (bsc#962356)
- rpm/kernel-source.spec.in: Install kernel-macros for kernel-source-vanilla (bsc#959090)
- rpm/kernel-spec-macros: Do not modify the release string in PTFs (bsc#963449)
- rpm/package-descriptions: Add kernel-zfcpdump and drop -desktop
- s390/cio: ensure consistent measurement state (bnc#964230).
- s390/cio: fix measurement characteristics memleak (bnc#964230).
- s390/cio: update measurement characteristics (bnc#964230).
- s390/dasd: fix failfast for disconnected devices (bnc#961202).
- s390/vtime: correct scaled cputime for SMT (bnc#964230).
- s390/vtime: correct scaled cputime of partially idle CPUs (bnc#964230).
- s390/vtime: limit MT scaling value updates (bnc#964230).
- sched,numa: cap pte scanning overhead to 3% of run time (Automatic NUMA Balancing).
- sched/fair: Care divide error in update_task_scan_period() (bsc#959463).
- sched/fair: Disable tg load_avg/runnable_avg update for root_task_group (bnc#960227).
- sched/fair: Move cache hot load_avg/runnable_avg into separate cacheline (bnc#960227).
- sched/numa: Cap PTE scanning overhead to 3% of run time (Automatic NUMA Balancing).
- sched: Fix race between task_group and sched_task_group (Automatic NUMA Balancing).
- scsi: restart list search after unlock in scsi_remove_target (bsc#944749, bsc#959257).
- supported.conf: Add more QEMU and VMware drivers to -base (bsc#965840).
- supported.conf: Add netfilter modules to base (bsc#950292)
- supported.conf: Add nls_iso8859-1 and nls_cp437 to -base (bsc#950292)
- supported.conf: Add vfat to -base to be able to mount the ESP (bsc#950292).
- supported.conf: Add virtio_{blk,net,scsi} to kernel-default-base (bsc#950292)
- supported.conf: Also add virtio_pci to kernel-default-base (bsc#950292).
- supported.conf: drop +external from ghash-clmulni-intel It was agreed that it does not make sense to maintain 'external' for this specific module. Furthermore it causes problems in rather ordinary VMware environments. (bsc#961971)
- udp: properly support MSG_PEEK with truncated buffers (bsc#951199 bsc#959364).
- x86, xsave: Support eager-only xsave features, add MPX support (bsc#938577).
- x86/apic: Introduce apic_extnmi command line parameter (bsc#940946, bsc#937444).
- x86/fpu/xstate: Do not assume the first zero xfeatures zero bit means the end (bsc#938577).
- x86/fpu: Fix double-increment in setup_xstate_features() (bsc#938577).
- x86/fpu: Remove xsave_init() bootmem allocations (bsc#938577).
- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).
- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).
- xen/pciback: Do not allow MSI-X ops if PCI_COMMAND_MEMORY is not set (bsc#957990 XSA-157).
- xfs: add a few more verifier tests (bsc#947953).
- xfs: fix double free in xlog_recover_commit_trans (bsc#947953).
- xfs: recovery of XLOG_UNMOUNT_TRANS leaks memory (bsc#947953).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-329,SUSE-SLE-Live-Patching-12-2016-329,SUSE-SLE-Module-Public-Cloud-12-2016-329,SUSE-SLE-SDK-12-SP1-2016-329,SUSE-SLE-SERVER-12-SP1-2016-329,SUSE-SLE-WE-12-SP1-2016-329
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.53 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).\n- CVE-2015-5707: Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request (bnc#940338).\n- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that was (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).\n- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).\n- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).\n- CVE-2015-8550: Optimizations introduced by the compiler could have lead to double fetch vulnerabilities, potentially possibly leading to arbitrary code execution in backend (bsc#957988).\n- CVE-2015-8551: Xen PCI backend driver did not perform proper sanity checks on the device\u0027s state, allowing for DoS (bsc#957990).\n- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).\n- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).\n- CVE-2015-8660: The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel attempted to merge distinct setattr operations, which allowed local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application (bnc#960281).\n- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).\n- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).\n- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).\n- CVE-2016-2069: A race in invalidating paging structures that were not in use locally could have lead to disclosoure of information or arbitrary code exectution (bnc#963767).\n\nThe following non-security bugs were fixed:\n- ACPI: Introduce apic_id in struct processor to save parsed APIC id (bsc#959463).\n- ACPI: Make it possible to get local x2apic id via _MAT (bsc#959463).\n- ACPI: use apic_id and remove duplicated _MAT evaluation (bsc#959463).\n- ACPICA: Correctly cleanup after a ACPI table load failure (bnc#937261).\n- Add sd_mod to initrd modules. For some reason PowerVM backend can\u0027t work without sd_mod\n- Do not modify perf bias performance setting by default at boot (bnc#812259, bsc#959629).\n- Documentation: Document kernel.panic_on_io_nmi sysctl (bsc#940946, bsc#937444).\n- Driver for IBM System i/p VNIC protocol\n- Drop blktap patches from SLE12, since the driver is unsupported\n- Improve fairness when locking the per-superblock s_anon list (bsc#957525, bsc#941363).\n- Input: aiptek - fix crash on detecting device without endpoints (bnc#956708).\n- NFSD: Do not start lockd when only NFSv4 is running\n- NFSv4: Recovery of recalled read delegations is broken (bsc#956514).\n- Replace with 176bed1d vmstat: explicitly schedule per-cpu work on the CPU we need it to run on\n- Revert \u0027ipv6: add complete rcu protection around np-\u003eopt\u0027 (bnc#961257).\n- Revert 874bbfe60 workqueue: make sure delayed work run in local cpu 1. Without 22b886dd, 874bbfe60 leads to timer corruption. 2. With 22b886dd applied, victim of 1 reports performance regression (1,2 https://lkml.org/lkml/2016/2/4/618) 3. Leads to scheduling work to offlined CPU (bnc#959463). SLERT: 4. NO_HZ_FULL regressession, unbound delayed work timer is no longer deflected to a housekeeper CPU.\n- be2net: fix some log messages (bnc#855062, bnc#867583).\n- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).\n- blktap: refine mm tracking (bsc#952976).\n- block: Always check queue limits for cloned requests (bsc#902606).\n- block: Always check queue limits for cloned requests (bsc#902606).\n- bnx2x: Add new device ids under the Qlogic vendor (bnc#964821).\n- btrfs: Add qgroup tracing (bnc#935087, bnc#945649).\n- btrfs: Update btrfs qgroup status item when rescan is done (bnc#960300).\n- btrfs: backref: Add special time_seq == (u64)-1 case for btrfs_find_all_roots() (bnc#935087, bnc#945649).\n- btrfs: backref: Do not merge refs which are not for same block (bnc#935087, bnc#945649).\n- btrfs: delayed-ref: Cleanup the unneeded functions (bnc#935087, bnc#945649).\n- btrfs: delayed-ref: Use list to replace the ref_root in ref_head (bnc#935087, bnc#945649).\n- btrfs: extent-tree: Use ref_node to replace unneeded parameters in __inc_extent_ref() and __free_extent() (bnc#935087, bnc#945649).\n- btrfs: fix comp_oper to get right order (bnc#935087, bnc#945649).\n- btrfs: fix deadlock between direct IO write and defrag/readpages (bnc#965344).\n- btrfs: fix leak in qgroup_subtree_accounting() error path (bnc#935087, bnc#945649).\n- btrfs: fix order by which delayed references are run (bnc#949440).\n- btrfs: fix qgroup sanity tests (bnc#951615).\n- btrfs: fix race waiting for qgroup rescan worker (bnc#960300).\n- btrfs: fix regression running delayed references when using qgroups (bnc#951615).\n- btrfs: fix regression when running delayed references (bnc#951615).\n- btrfs: fix sleeping inside atomic context in qgroup rescan worker (bnc#960300).\n- btrfs: keep dropped roots in cache until transaction commit (bnc#935087, bnc#945649).\n- btrfs: qgroup: Add function qgroup_update_counters() (bnc#935087, bnc#945649).\n- btrfs: qgroup: Add function qgroup_update_refcnt() (bnc#935087, bnc#945649).\n- btrfs: qgroup: Add new function to record old_roots (bnc#935087, bnc#945649).\n- btrfs: qgroup: Add new qgroup calculation function btrfs_qgroup_account_extents() (bnc#935087, bnc#945649).\n- btrfs: qgroup: Add the ability to skip given qgroup for old/new_roots (bnc#935087, bnc#945649).\n- btrfs: qgroup: Cleanup open-coded old/new_refcnt update and read (bnc#935087, bnc#945649).\n- btrfs: qgroup: Cleanup the old ref_node-oriented mechanism (bnc#935087, bnc#945649).\n- btrfs: qgroup: Do not copy extent buffer to do qgroup rescan (bnc#960300).\n- btrfs: qgroup: Fix a regression in qgroup reserved space (bnc#935087, bnc#945649).\n- btrfs: qgroup: Make snapshot accounting work with new extent-oriented qgroup (bnc#935087, bnc#945649).\n- btrfs: qgroup: Record possible quota-related extent for qgroup (bnc#935087, bnc#945649).\n- btrfs: qgroup: Switch rescan to new mechanism (bnc#935087, bnc#945649).\n- btrfs: qgroup: Switch self test to extent-oriented qgroup mechanism (bnc#935087, bnc#945649).\n- btrfs: qgroup: Switch to new extent-oriented qgroup mechanism (bnc#935087, bnc#945649).\n- btrfs: qgroup: account shared subtree during snapshot delete (bnc#935087, bnc#945649).\n- btrfs: qgroup: clear STATUS_FLAG_ON in disabling quota (bnc#960300).\n- btrfs: qgroup: exit the rescan worker during umount (bnc#960300).\n- btrfs: qgroup: fix quota disable during rescan (bnc#960300).\n- btrfs: qgroup: move WARN_ON() to the correct location (bnc#935087, bnc#945649).\n- btrfs: remove transaction from send (bnc#935087, bnc#945649).\n- btrfs: skip locking when searching commit root (bnc#963825).\n- btrfs: ulist: Add ulist_del() function (bnc#935087, bnc#945649).\n- btrfs: use btrfs_get_fs_root in resolve_indirect_ref (bnc#935087, bnc#945649).\n- crypto: nx - use common code for both NX decompress success cases (bsc#942476).\n- crypto: nx-842 - Mask XERS0 bit in return value (bsc#960221).\n- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).\n- drivers/firmware/memmap.c: do not allocate firmware_map_entry of same memory range (bsc#959463).\n- drivers/firmware/memmap.c: do not create memmap sysfs of same firmware_map_entry (bsc#959463).\n- drivers/firmware/memmap.c: pass the correct argument to firmware_map_find_entry_bootmem() (bsc#959463).\n- e1000e: Do not read ICR in Other interrupt (bsc#924919).\n- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).\n- e1000e: Fix msi-x interrupt automask (bsc#924919).\n- e1000e: Remove unreachable code (bsc#924919).\n- fuse: break infinite loop in fuse_fill_write_pages() (bsc#963765).\n- group-source-files: mark module.lds as devel file ld: cannot open linker script file /usr/src/linux-4.2.5-1/arch/arm/kernel/module.lds: No such file or directory\n- ipv6: fix tunnel error handling (bsc#952579).\n- jbd2: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).\n- kABI: reintroduce blk_rq_check_limits.\n- kabi: protect struct acpi_processor signature (bsc#959463).\n- kernel/watchdog.c: perform all-CPU backtrace in case of hard lockup (bsc#940946, bsc#937444).\n- kernel: Change ASSIGN_ONCE(val, x) to WRITE_ONCE(x, val) (bsc#940946, bsc#937444).\n- kernel: Provide READ_ONCE and ASSIGN_ONCE (bsc#940946, bsc#937444).\n- kernel: inadvertent free of the vector register save area (bnc#961202).\n- kexec: Fix race between panic() and crash_kexec() (bsc#940946, bsc#937444).\n- kgr: Remove the confusing search for fentry\n- kgr: Safe way to avoid an infinite redirection\n- kgr: do not print error for !abort_if_missing symbols (bnc#943989).\n- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).\n- kgr: log when modifying kernel\n- kgr: mark some more missed kthreads (bnc#962336).\n- kgr: usb/storage: do not emit thread awakened (bnc#899908).\n- kvm: Add arch specific mmu notifier for page invalidation (bsc#959463).\n- kvm: Make init_rmode_identity_map() return 0 on success (bsc#959463).\n- kvm: Remove ept_identity_pagetable from struct kvm_arch (bsc#959463).\n- kvm: Rename make_all_cpus_request() to kvm_make_all_cpus_request() and make it non-static (bsc#959463).\n- kvm: Use APIC_DEFAULT_PHYS_BASE macro as the apic access page address (bsc#959463).\n- kvm: vmx: Implement set_apic_access_page_addr (bsc#959463).\n- kvm: x86: Add request bit to reload APIC access page address (bsc#959463).\n- kvm: x86: Unpin and remove kvm_arch-\u003eapic_access_page (bsc#959463).\n- libiscsi: Fix host busy blocking during connection teardown.\n- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).\n- md/bitmap: do not pass -1 to bitmap_storage_alloc (bsc#955118).\n- md/bitmap: remove confusing code from filemap_get_page.\n- md/bitmap: remove rcu annotation from pointer arithmetic.\n- mem-hotplug: reset node managed pages when hot-adding a new pgdat (bsc#959463).\n- mem-hotplug: reset node present pages when hot-adding a new pgdat (bsc#959463).\n- memory-hotplug: clear pgdat which is allocated by bootmem in try_offline_node() (bsc#959463).\n- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (VM Functionality, bnc#961588).\n- mm/mempolicy.c: convert the shared_policy lock to a rwlock (VM Performance, bnc#959436).\n- module: keep percpu symbols in module\u0027s symtab (bsc#962788).\n- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).\n- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).\n- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).\n- panic, x86: Allow CPUs to save registers even if looping in NMI context (bsc#940946, bsc#937444).\n- panic, x86: Fix re-entrance problem due to panic on NMI (bsc#940946, bsc#937444).\n- pci: Check for valid tags when calculating the VPD size (bsc#959146).\n- qeth: initialize net_device with carrier off (bnc#964230).\n- rpm/constraints.in: Bump disk space requirements up a bit Require 10GB on s390x, 20GB elsewhere.\n- rpm/kernel-binary.spec.in: Fix build if no UEFI certs are installed\n- rpm/kernel-binary.spec.in: Fix kernel-vanilla-devel dependency (bsc#959090)\n- rpm/kernel-binary.spec.in: Fix paths in kernel-vanilla-devel (bsc#959090).\n- rpm/kernel-binary.spec.in: Install libopenssl-devel for newer sign-file\n- rpm/kernel-binary.spec.in: Use bzip compression to speed up build (bsc#962356)\n- rpm/kernel-source.spec.in: Install kernel-macros for kernel-source-vanilla (bsc#959090)\n- rpm/kernel-spec-macros: Do not modify the release string in PTFs (bsc#963449)\n- rpm/package-descriptions: Add kernel-zfcpdump and drop -desktop\n- s390/cio: ensure consistent measurement state (bnc#964230).\n- s390/cio: fix measurement characteristics memleak (bnc#964230).\n- s390/cio: update measurement characteristics (bnc#964230).\n- s390/dasd: fix failfast for disconnected devices (bnc#961202).\n- s390/vtime: correct scaled cputime for SMT (bnc#964230).\n- s390/vtime: correct scaled cputime of partially idle CPUs (bnc#964230).\n- s390/vtime: limit MT scaling value updates (bnc#964230).\n- sched,numa: cap pte scanning overhead to 3% of run time (Automatic NUMA Balancing).\n- sched/fair: Care divide error in update_task_scan_period() (bsc#959463).\n- sched/fair: Disable tg load_avg/runnable_avg update for root_task_group (bnc#960227).\n- sched/fair: Move cache hot load_avg/runnable_avg into separate cacheline (bnc#960227).\n- sched/numa: Cap PTE scanning overhead to 3% of run time (Automatic NUMA Balancing).\n- sched: Fix race between task_group and sched_task_group (Automatic NUMA Balancing).\n- scsi: restart list search after unlock in scsi_remove_target (bsc#944749, bsc#959257).\n- supported.conf: Add more QEMU and VMware drivers to -base (bsc#965840).\n- supported.conf: Add netfilter modules to base (bsc#950292)\n- supported.conf: Add nls_iso8859-1 and nls_cp437 to -base (bsc#950292)\n- supported.conf: Add vfat to -base to be able to mount the ESP (bsc#950292).\n- supported.conf: Add virtio_{blk,net,scsi} to kernel-default-base (bsc#950292)\n- supported.conf: Also add virtio_pci to kernel-default-base (bsc#950292).\n- supported.conf: drop +external from ghash-clmulni-intel It was agreed that it does not make sense to maintain \u0027external\u0027 for this specific module. Furthermore it causes problems in rather ordinary VMware environments. (bsc#961971)\n- udp: properly support MSG_PEEK with truncated buffers (bsc#951199 bsc#959364).\n- x86, xsave: Support eager-only xsave features, add MPX support (bsc#938577).\n- x86/apic: Introduce apic_extnmi command line parameter (bsc#940946, bsc#937444).\n- x86/fpu/xstate: Do not assume the first zero xfeatures zero bit means the end (bsc#938577).\n- x86/fpu: Fix double-increment in setup_xstate_features() (bsc#938577).\n- x86/fpu: Remove xsave_init() bootmem allocations (bsc#938577).\n- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).\n- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).\n- xen/pciback: Do not allow MSI-X ops if PCI_COMMAND_MEMORY is not set (bsc#957990 XSA-157).\n- xfs: add a few more verifier tests (bsc#947953).\n- xfs: fix double free in xlog_recover_commit_trans (bsc#947953).\n- xfs: recovery of XLOG_UNMOUNT_TRANS leaks memory (bsc#947953).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-329,SUSE-SLE-Live-Patching-12-2016-329,SUSE-SLE-Module-Public-Cloud-12-2016-329,SUSE-SLE-SDK-12-SP1-2016-329,SUSE-SLE-SERVER-12-SP1-2016-329,SUSE-SLE-WE-12-SP1-2016-329", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0585-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0585-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160585-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0585-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" }, { "category": "self", "summary": "SUSE Bug 812259", "url": "https://bugzilla.suse.com/812259" }, { "category": "self", "summary": "SUSE Bug 855062", "url": "https://bugzilla.suse.com/855062" }, { "category": "self", "summary": "SUSE Bug 867583", "url": "https://bugzilla.suse.com/867583" }, { "category": "self", "summary": "SUSE Bug 899908", "url": "https://bugzilla.suse.com/899908" }, { "category": "self", "summary": "SUSE Bug 902606", "url": "https://bugzilla.suse.com/902606" }, { "category": "self", "summary": "SUSE Bug 924919", "url": "https://bugzilla.suse.com/924919" }, { "category": "self", "summary": "SUSE Bug 935087", "url": "https://bugzilla.suse.com/935087" }, { "category": "self", "summary": "SUSE Bug 937261", "url": "https://bugzilla.suse.com/937261" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 938577", "url": "https://bugzilla.suse.com/938577" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940946", "url": "https://bugzilla.suse.com/940946" }, { "category": "self", "summary": "SUSE Bug 941363", "url": "https://bugzilla.suse.com/941363" }, { "category": "self", "summary": "SUSE Bug 942476", "url": "https://bugzilla.suse.com/942476" }, { "category": "self", "summary": "SUSE Bug 943989", "url": "https://bugzilla.suse.com/943989" }, { "category": "self", "summary": "SUSE Bug 944749", "url": "https://bugzilla.suse.com/944749" }, { "category": "self", "summary": "SUSE Bug 945649", "url": "https://bugzilla.suse.com/945649" }, { "category": "self", "summary": "SUSE Bug 947953", "url": "https://bugzilla.suse.com/947953" }, { "category": "self", "summary": "SUSE Bug 949440", "url": "https://bugzilla.suse.com/949440" }, { "category": "self", "summary": "SUSE Bug 949936", "url": "https://bugzilla.suse.com/949936" }, { "category": "self", "summary": "SUSE Bug 950292", "url": "https://bugzilla.suse.com/950292" }, { "category": "self", "summary": "SUSE Bug 951199", "url": "https://bugzilla.suse.com/951199" }, { "category": "self", "summary": "SUSE Bug 951392", "url": "https://bugzilla.suse.com/951392" }, { "category": "self", "summary": "SUSE Bug 951615", "url": "https://bugzilla.suse.com/951615" }, { "category": "self", "summary": "SUSE Bug 952579", "url": "https://bugzilla.suse.com/952579" }, { "category": "self", "summary": "SUSE Bug 952976", "url": "https://bugzilla.suse.com/952976" }, { "category": "self", "summary": "SUSE Bug 954992", "url": "https://bugzilla.suse.com/954992" }, { "category": "self", "summary": "SUSE Bug 955118", "url": "https://bugzilla.suse.com/955118" }, { "category": "self", "summary": "SUSE Bug 955354", "url": "https://bugzilla.suse.com/955354" }, { "category": "self", "summary": "SUSE Bug 955654", "url": "https://bugzilla.suse.com/955654" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 956708", "url": "https://bugzilla.suse.com/956708" }, { "category": "self", "summary": "SUSE Bug 957525", "url": "https://bugzilla.suse.com/957525" }, { "category": "self", "summary": "SUSE Bug 957988", "url": "https://bugzilla.suse.com/957988" }, { "category": "self", "summary": "SUSE Bug 957990", "url": "https://bugzilla.suse.com/957990" }, { "category": "self", "summary": "SUSE Bug 958463", "url": "https://bugzilla.suse.com/958463" }, { "category": "self", "summary": "SUSE Bug 958886", "url": "https://bugzilla.suse.com/958886" }, { "category": "self", "summary": "SUSE Bug 958951", "url": "https://bugzilla.suse.com/958951" }, { "category": "self", "summary": "SUSE Bug 959090", "url": "https://bugzilla.suse.com/959090" }, { "category": "self", "summary": "SUSE Bug 959146", "url": "https://bugzilla.suse.com/959146" }, { "category": "self", "summary": "SUSE Bug 959190", "url": "https://bugzilla.suse.com/959190" }, { "category": "self", "summary": "SUSE Bug 959257", "url": "https://bugzilla.suse.com/959257" }, { "category": "self", "summary": "SUSE Bug 959364", "url": "https://bugzilla.suse.com/959364" }, { "category": "self", "summary": "SUSE Bug 959399", "url": "https://bugzilla.suse.com/959399" }, { "category": "self", "summary": "SUSE Bug 959436", "url": "https://bugzilla.suse.com/959436" }, { "category": "self", "summary": "SUSE Bug 959463", "url": "https://bugzilla.suse.com/959463" }, { "category": "self", "summary": "SUSE Bug 959629", "url": "https://bugzilla.suse.com/959629" }, { "category": "self", "summary": "SUSE Bug 960221", "url": "https://bugzilla.suse.com/960221" }, { "category": "self", "summary": "SUSE Bug 960227", "url": "https://bugzilla.suse.com/960227" }, { "category": "self", "summary": "SUSE Bug 960281", "url": "https://bugzilla.suse.com/960281" }, { "category": "self", "summary": "SUSE Bug 960300", "url": "https://bugzilla.suse.com/960300" }, { "category": "self", "summary": "SUSE Bug 961202", "url": "https://bugzilla.suse.com/961202" }, { "category": "self", "summary": "SUSE Bug 961257", "url": "https://bugzilla.suse.com/961257" }, { "category": "self", "summary": "SUSE Bug 961500", "url": "https://bugzilla.suse.com/961500" }, { "category": "self", "summary": "SUSE Bug 961509", "url": "https://bugzilla.suse.com/961509" }, { "category": "self", "summary": "SUSE Bug 961516", "url": "https://bugzilla.suse.com/961516" }, { "category": "self", "summary": "SUSE Bug 961588", "url": "https://bugzilla.suse.com/961588" }, { "category": "self", "summary": "SUSE Bug 961971", "url": "https://bugzilla.suse.com/961971" }, { "category": "self", "summary": "SUSE Bug 962336", "url": "https://bugzilla.suse.com/962336" }, { "category": "self", "summary": "SUSE Bug 962356", "url": "https://bugzilla.suse.com/962356" }, { "category": "self", "summary": "SUSE Bug 962788", "url": "https://bugzilla.suse.com/962788" }, { "category": "self", "summary": "SUSE Bug 962965", "url": "https://bugzilla.suse.com/962965" }, { "category": "self", "summary": "SUSE Bug 963449", "url": "https://bugzilla.suse.com/963449" }, { "category": "self", "summary": "SUSE Bug 963572", "url": "https://bugzilla.suse.com/963572" }, { "category": "self", "summary": "SUSE Bug 963765", "url": "https://bugzilla.suse.com/963765" }, { "category": "self", "summary": "SUSE Bug 963767", "url": "https://bugzilla.suse.com/963767" }, { "category": "self", "summary": "SUSE Bug 963825", "url": "https://bugzilla.suse.com/963825" }, { "category": "self", "summary": "SUSE Bug 964230", "url": "https://bugzilla.suse.com/964230" }, { "category": "self", "summary": "SUSE Bug 964821", "url": "https://bugzilla.suse.com/964821" }, { "category": "self", "summary": "SUSE Bug 965344", "url": "https://bugzilla.suse.com/965344" }, { "category": "self", "summary": "SUSE Bug 965840", "url": "https://bugzilla.suse.com/965840" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7550 page", "url": "https://www.suse.com/security/cve/CVE-2015-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8543 page", "url": "https://www.suse.com/security/cve/CVE-2015-8543/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8550 page", "url": "https://www.suse.com/security/cve/CVE-2015-8550/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8551 page", "url": "https://www.suse.com/security/cve/CVE-2015-8551/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8569 page", "url": "https://www.suse.com/security/cve/CVE-2015-8569/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8575 page", "url": "https://www.suse.com/security/cve/CVE-2015-8575/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8660 page", "url": "https://www.suse.com/security/cve/CVE-2015-8660/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8767 page", "url": "https://www.suse.com/security/cve/CVE-2015-8767/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8785 page", "url": "https://www.suse.com/security/cve/CVE-2015-8785/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0723 page", "url": "https://www.suse.com/security/cve/CVE-2016-0723/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2069 page", "url": "https://www.suse.com/security/cve/CVE-2016-2069/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-02-25T16:23:22Z", "generator": { "date": "2016-02-25T16:23:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0585-1", "initial_release_date": "2016-02-25T16:23:22Z", "revision_history": [ { "date": "2016-02-25T16:23:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.53-60.30.1.noarch", "product": { "name": "kernel-devel-3.12.53-60.30.1.noarch", "product_id": "kernel-devel-3.12.53-60.30.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.53-60.30.1.noarch", "product": { "name": "kernel-macros-3.12.53-60.30.1.noarch", "product_id": "kernel-macros-3.12.53-60.30.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.53-60.30.1.noarch", "product": { "name": "kernel-source-3.12.53-60.30.1.noarch", "product_id": "kernel-source-3.12.53-60.30.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.53-60.30.2.noarch", "product": { "name": "kernel-docs-3.12.53-60.30.2.noarch", "product_id": "kernel-docs-3.12.53-60.30.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.53-60.30.2.ppc64le", "product": { "name": "kernel-obs-build-3.12.53-60.30.2.ppc64le", "product_id": "kernel-obs-build-3.12.53-60.30.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.53-60.30.1.ppc64le", "product": { "name": "kernel-default-3.12.53-60.30.1.ppc64le", "product_id": "kernel-default-3.12.53-60.30.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.53-60.30.1.ppc64le", "product": { "name": "kernel-default-base-3.12.53-60.30.1.ppc64le", "product_id": "kernel-default-base-3.12.53-60.30.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.53-60.30.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.53-60.30.1.ppc64le", "product_id": "kernel-default-devel-3.12.53-60.30.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.53-60.30.1.ppc64le", "product": { "name": "kernel-syms-3.12.53-60.30.1.ppc64le", "product_id": "kernel-syms-3.12.53-60.30.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.53-60.30.2.s390x", "product": { "name": "kernel-obs-build-3.12.53-60.30.2.s390x", "product_id": "kernel-obs-build-3.12.53-60.30.2.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.53-60.30.1.s390x", "product": { "name": "kernel-default-3.12.53-60.30.1.s390x", "product_id": "kernel-default-3.12.53-60.30.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.53-60.30.1.s390x", "product": { "name": "kernel-default-base-3.12.53-60.30.1.s390x", "product_id": "kernel-default-base-3.12.53-60.30.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.53-60.30.1.s390x", "product": { "name": "kernel-default-devel-3.12.53-60.30.1.s390x", "product_id": "kernel-default-devel-3.12.53-60.30.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.53-60.30.1.s390x", "product": { "name": "kernel-default-man-3.12.53-60.30.1.s390x", "product_id": "kernel-default-man-3.12.53-60.30.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.53-60.30.1.s390x", "product": { "name": "kernel-syms-3.12.53-60.30.1.s390x", "product_id": "kernel-syms-3.12.53-60.30.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-default-3.12.53-60.30.1.x86_64", "product_id": "kernel-default-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-default-devel-3.12.53-60.30.1.x86_64", "product_id": "kernel-default-devel-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-default-extra-3.12.53-60.30.1.x86_64", "product_id": "kernel-default-extra-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-syms-3.12.53-60.30.1.x86_64", "product_id": "kernel-syms-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-xen-3.12.53-60.30.1.x86_64", "product_id": "kernel-xen-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.53-60.30.1.x86_64", "product_id": "kernel-xen-devel-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-ec2-3.12.53-60.30.1.x86_64", "product_id": "kernel-ec2-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.53-60.30.1.x86_64", "product_id": "kernel-ec2-devel-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.53-60.30.1.x86_64", "product_id": "kernel-ec2-extra-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.53-60.30.2.x86_64", "product": { "name": "kernel-obs-build-3.12.53-60.30.2.x86_64", "product_id": "kernel-obs-build-3.12.53-60.30.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-default-base-3.12.53-60.30.1.x86_64", "product_id": "kernel-default-base-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.53-60.30.1.x86_64", "product": { "name": "kernel-xen-base-3.12.53-60.30.1.x86_64", "product_id": "kernel-xen-base-3.12.53-60.30.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.7.0-3.1.x86_64", "product": { "name": "lttng-modules-2.7.0-3.1.x86_64", "product_id": "lttng-modules-2.7.0-3.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "product": { "name": "lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "product_id": "lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.53-60.30.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch" }, "product_reference": "kernel-devel-3.12.53-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.53-60.30.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch" }, "product_reference": "kernel-macros-3.12.53-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.53-60.30.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch" }, "product_reference": "kernel-source-3.12.53-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-syms-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-xen-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-ec2-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.53-60.30.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch" }, "product_reference": "kernel-docs-3.12.53-60.30.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.53-60.30.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le" }, "product_reference": "kernel-obs-build-3.12.53-60.30.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.53-60.30.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x" }, "product_reference": "kernel-obs-build-3.12.53-60.30.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.53-60.30.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64" }, "product_reference": "kernel-obs-build-3.12.53-60.30.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.53-60.30.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le" }, "product_reference": "kernel-default-3.12.53-60.30.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-default-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.53-60.30.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.53-60.30.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-default-base-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-base-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.53-60.30.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.53-60.30.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-default-devel-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-default-man-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.53-60.30.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch" }, "product_reference": "kernel-devel-3.12.53-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.53-60.30.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch" }, "product_reference": "kernel-macros-3.12.53-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.53-60.30.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch" }, "product_reference": "kernel-source-3.12.53-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.53-60.30.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le" }, "product_reference": "kernel-syms-3.12.53-60.30.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-syms-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-syms-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-xen-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.0-3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64" }, "product_reference": "lttng-modules-2.7.0-3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.53-60.30.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le" }, "product_reference": "kernel-default-3.12.53-60.30.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-default-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.53-60.30.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.53-60.30.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-default-base-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-base-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.53-60.30.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.53-60.30.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-default-devel-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-default-man-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.53-60.30.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch" }, "product_reference": "kernel-devel-3.12.53-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.53-60.30.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch" }, "product_reference": "kernel-macros-3.12.53-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.53-60.30.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch" }, "product_reference": "kernel-source-3.12.53-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.53-60.30.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le" }, "product_reference": "kernel-syms-3.12.53-60.30.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.53-60.30.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x" }, "product_reference": "kernel-syms-3.12.53-60.30.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-syms-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-xen-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.0-3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64" }, "product_reference": "lttng-modules-2.7.0-3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.53-60.30.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.53-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7550" } ], "notes": [ { "category": "general", "text": "The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7550", "url": "https://www.suse.com/security/cve/CVE-2015-7550" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 958951 for CVE-2015-7550", "url": "https://bugzilla.suse.com/958951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2015-7550" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2015-8215" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "important" } ], "title": "CVE-2015-8539" }, { "cve": "CVE-2015-8543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8543" } ], "notes": [ { "category": "general", "text": "The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8543", "url": "https://www.suse.com/security/cve/CVE-2015-8543" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8543", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8543", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8543", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8543", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 958886 for CVE-2015-8543", "url": "https://bugzilla.suse.com/958886" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8543", "url": "https://bugzilla.suse.com/963994" }, { "category": "external", "summary": "SUSE Bug 969522 for CVE-2015-8543", "url": "https://bugzilla.suse.com/969522" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "moderate" } ], "title": "CVE-2015-8543" }, { "cve": "CVE-2015-8550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8550" } ], "notes": [ { "category": "general", "text": "Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8550", "url": "https://www.suse.com/security/cve/CVE-2015-8550" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8550", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8550", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 957988 for CVE-2015-8550", "url": "https://bugzilla.suse.com/957988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "important" } ], "title": "CVE-2015-8550" }, { "cve": "CVE-2015-8551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8551" } ], "notes": [ { "category": "general", "text": "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \"Linux pciback missing sanity checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8551", "url": "https://www.suse.com/security/cve/CVE-2015-8551" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8551", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 957990 for CVE-2015-8551", "url": "https://bugzilla.suse.com/957990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "moderate" } ], "title": "CVE-2015-8551" }, { "cve": "CVE-2015-8569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8569" } ], "notes": [ { "category": "general", "text": "The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8569", "url": "https://www.suse.com/security/cve/CVE-2015-8569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8569", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 959190 for CVE-2015-8569", "url": "https://bugzilla.suse.com/959190" }, { "category": "external", "summary": "SUSE Bug 959399 for CVE-2015-8569", "url": "https://bugzilla.suse.com/959399" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8569", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2015-8569" }, { "cve": "CVE-2015-8575", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8575" } ], "notes": [ { "category": "general", "text": "The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8575", "url": "https://www.suse.com/security/cve/CVE-2015-8575" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8575", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 959190 for CVE-2015-8575", "url": "https://bugzilla.suse.com/959190" }, { "category": "external", "summary": "SUSE Bug 959399 for CVE-2015-8575", "url": "https://bugzilla.suse.com/959399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2015-8575" }, { "cve": "CVE-2015-8660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8660" } ], "notes": [ { "category": "general", "text": "The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8660", "url": "https://www.suse.com/security/cve/CVE-2015-8660" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8660", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 960281 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960281" }, { "category": "external", "summary": "SUSE Bug 960329 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960329" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8660", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "important" } ], "title": "CVE-2015-8660" }, { "cve": "CVE-2015-8767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8767" } ], "notes": [ { "category": "general", "text": "net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8767", "url": "https://www.suse.com/security/cve/CVE-2015-8767" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8767", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8767", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 961509 for CVE-2015-8767", "url": "https://bugzilla.suse.com/961509" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2015-8767" }, { "cve": "CVE-2015-8785", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8785" } ], "notes": [ { "category": "general", "text": "The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8785", "url": "https://www.suse.com/security/cve/CVE-2015-8785" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8785", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963765 for CVE-2015-8785", "url": "https://bugzilla.suse.com/963765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2015-8785" }, { "cve": "CVE-2016-0723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0723" } ], "notes": [ { "category": "general", "text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0723", "url": "https://www.suse.com/security/cve/CVE-2016-0723" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0723", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961500 for CVE-2016-0723", "url": "https://bugzilla.suse.com/961500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2016-0723" }, { "cve": "CVE-2016-2069", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2069" } ], "notes": [ { "category": "general", "text": "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2069", "url": "https://www.suse.com/security/cve/CVE-2016-2069" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-2069", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 963767 for CVE-2016-2069", "url": "https://bugzilla.suse.com/963767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.53-60.30.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.53-60.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.53_60.30-3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.53-60.30.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.53-60.30.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.53-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-25T16:23:22Z", "details": "low" } ], "title": "CVE-2016-2069" } ] }
suse-su-2015:2085-1
Vulnerability from csaf_suse
Published
2015-11-24 14:48
Modified
2015-11-24 14:48
Summary
Security update for Linux Kernel Live Patch 4
Notes
Title of the patch
Security update for Linux Kernel Live Patch 4
Description of the patch
This kernel live patch for Linux Kernel 3.12.39-47.1 fixes two security issues:
- CVE-2015-7613: A race condition in the IPC object implementation in
the Linux kernel allowed local users to gain privileges by triggering an
ipc_addid call that leads to uid and gid comparisons against uninitialized
data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)
- CVE-2015-5707: Integer overflow in the sg_start_req function in
drivers/scsi/sg.c in the Linux kernel allowed local users to cause a
denial of service or possibly have unspecified other impact via a large
iov_count value in a write request. (bsc#940342 bsc#940338)
Patchnames
SUSE-SLE-Live-Patching-12-2015-886
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 4", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.39-47.1 fixes two security issues:\n\n- CVE-2015-7613: A race condition in the IPC object implementation in\n the Linux kernel allowed local users to gain privileges by triggering an\n ipc_addid call that leads to uid and gid comparisons against uninitialized\n data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)\n- CVE-2015-5707: Integer overflow in the sg_start_req function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to cause a\n denial of service or possibly have unspecified other impact via a large\n iov_count value in a write request. (bsc#940342 bsc#940338)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2015-886", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2085-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2085-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152085-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2085-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-November/001693.html" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 948536", "url": "https://bugzilla.suse.com/948536" }, { "category": "self", "summary": "SUSE Bug 948701", "url": "https://bugzilla.suse.com/948701" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7613 page", "url": "https://www.suse.com/security/cve/CVE-2015-7613/" } ], "title": "Security update for Linux Kernel Live Patch 4", "tracking": { "current_release_date": "2015-11-24T14:48:07Z", "generator": { "date": "2015-11-24T14:48:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2085-1", "initial_release_date": "2015-11-24T14:48:07Z", "revision_history": [ { "date": "2015-11-24T14:48:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_39-47-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_39-47-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_39-47-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_39-47-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_39-47-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_39-47-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_39-47-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_39-47-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_39-47-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_39-47-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:48:07Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-7613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7613" } ], "notes": [ { "category": "general", "text": "Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7613", "url": "https://www.suse.com/security/cve/CVE-2015-7613" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-7613", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 948536 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948536" }, { "category": "external", "summary": "SUSE Bug 948701 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948701" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-7613", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:48:07Z", "details": "important" } ], "title": "CVE-2015-7613" } ] }
suse-su-2015:2084-1
Vulnerability from csaf_suse
Published
2015-11-24 14:48
Modified
2015-11-24 14:48
Summary
Security update for Linux Kernel Live Patch 5
Notes
Title of the patch
Security update for Linux Kernel Live Patch 5
Description of the patch
This kernel live patch for Linux Kernel 3.12.43-52.6.1 fixes two security issues:
- CVE-2015-7613: A race condition in the IPC object implementation in
the Linux kernel allowed local users to gain privileges by triggering an
ipc_addid call that leads to uid and gid comparisons against uninitialized
data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)
- CVE-2015-5707: Integer overflow in the sg_start_req function in
drivers/scsi/sg.c in the Linux kernel allowed local users to cause a
denial of service or possibly have unspecified other impact via a large
iov_count value in a write request. (bsc#940342 bsc#940338)
Patchnames
SUSE-SLE-Live-Patching-12-2015-887
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 5", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.43-52.6.1 fixes two security issues:\n\n- CVE-2015-7613: A race condition in the IPC object implementation in\n the Linux kernel allowed local users to gain privileges by triggering an\n ipc_addid call that leads to uid and gid comparisons against uninitialized\n data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)\n- CVE-2015-5707: Integer overflow in the sg_start_req function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to cause a\n denial of service or possibly have unspecified other impact via a large\n iov_count value in a write request. (bsc#940342 bsc#940338)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2015-887", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2084-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2084-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152084-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2084-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-November/001692.html" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 948536", "url": "https://bugzilla.suse.com/948536" }, { "category": "self", "summary": "SUSE Bug 948701", "url": "https://bugzilla.suse.com/948701" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7613 page", "url": "https://www.suse.com/security/cve/CVE-2015-7613/" } ], "title": "Security update for Linux Kernel Live Patch 5", "tracking": { "current_release_date": "2015-11-24T14:48:34Z", "generator": { "date": "2015-11-24T14:48:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2084-1", "initial_release_date": "2015-11-24T14:48:34Z", "revision_history": [ { "date": "2015-11-24T14:48:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:48:34Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-7613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7613" } ], "notes": [ { "category": "general", "text": "Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7613", "url": "https://www.suse.com/security/cve/CVE-2015-7613" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-7613", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 948536 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948536" }, { "category": "external", "summary": "SUSE Bug 948701 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948701" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-7613", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:48:34Z", "details": "important" } ], "title": "CVE-2015-7613" } ] }
suse-su-2016:0785-1
Vulnerability from csaf_suse
Published
2016-03-16 10:39
Modified
2016-03-16 10:39
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to 3.12.55 to receive various security and bugfixes.
Features added:
- A improved XEN blkfront module was added, which allows more I/O bandwidth. (FATE#320625)
It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode.
The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
the Linux kernel allowed local users to bypass intended AF_UNIX socket
permissions or cause a denial of service (panic) via crafted epoll_ctl
calls (bnc#955654).
- CVE-2015-5707: Integer overflow in the sg_start_req function in
drivers/scsi/sg.c in the Linux kernel allowed local users to cause a
denial of service or possibly have unspecified other impact via a large
iov_count value in a write request (bnc#940338).
- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and
gid mappings, which allowed local users to gain privileges by establishing
a user namespace, waiting for a root process to enter that namespace
with an unsafe uid or gid, and then using the ptrace system call. NOTE:
the vendor states 'there is no kernel bug here' (bnc#959709 bnc#960561).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
properly manage the relationship between a lock and a socket, which
allowed local users to cause a denial of service (deadlock) via a crafted
sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
in the Linux kernel allowed local users to cause a denial of service
(infinite loop) via a writev system call that triggers a zero length
for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
driver when the network was considered to be congested. This could be
used by local attackers to cause machine crashes or potentially code
executuon (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
sensitive information from kernel memory or cause a denial of service
(use-after-free and system crash) by making a TIOCGETD ioctl call during
processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-0774: A pipe buffer state corruption after unsuccessful atomic
read from pipe was fixed (bsc#964730).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could
leak to information leaks (bnc#963767).
- CVE-2016-2384: A double-free triggered by invalid USB descriptor in
ALSA usb-audio was fixed, which could be exploited by physical local
attackers to crash the kernel or gain code execution (bnc#966693).
The following non-security bugs were fixed:
- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).
- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
- be2net: fix some log messages (bnc#855062 FATE#315961, bnc#867583).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#957986 fate#320625).
- btrfs: Add handler for invalidate page (bsc#963193).
- btrfs: check prepare_uptodate_page() error code earlier (bnc#966910).
- btrfs: delayed_ref: Add new function to record reserved space into delayed ref (bsc#963193).
- btrfs: delayed_ref: release and free qgroup reserved at proper timing (bsc#963193).
- btrfs: extent_io: Introduce needed structure for recoding set/clear bits (bsc#963193).
- btrfs: extent_io: Introduce new function clear_record_extent_bits() (bsc#963193).
- btrfs: extent_io: Introduce new function set_record_extent_bits (bsc#963193).
- btrfs: extent-tree: Add new version of btrfs_check_data_free_space and btrfs_free_reserved_data_space (bsc#963193).
- btrfs: extent-tree: Add new version of btrfs_delalloc_reserve/release_space (bsc#963193).
- btrfs: extent-tree: Switch to new check_data_free_space and free_reserved_data_space (bsc#963193).
- btrfs: extent-tree: Switch to new delalloc space reserve and release (bsc#963193).
- btrfs: fallocate: Add support to accurate qgroup reserve (bsc#963193).
- btrfs: fix deadlock between direct IO write and defrag/readpages (bnc#965344).
- btrfs: fix invalid page accesses in extent_same (dedup) ioctl (bnc#968230).
- btrfs: fix page reading in extent_same ioctl leading to csum errors (bnc#968230).
- btrfs: fix warning in backref walking (bnc#966278).
- btrfs: qgroup: Add handler for NOCOW and inline (bsc#963193).
- btrfs: qgroup: Add new trace point for qgroup data reserve (bsc#963193).
- btrfs: qgroup: Avoid calling btrfs_free_reserved_data_space in clear_bit_hook (bsc#963193).
- btrfs: qgroup: Check if qgroup reserved space leaked (bsc#963193).
- btrfs: qgroup: Cleanup old inaccurate facilities (bsc#963193).
- btrfs: qgroup: Fix a race in delayed_ref which leads to abort trans (bsc#963193).
- btrfs: qgroup: Fix a rebase bug which will cause qgroup double free (bsc#963193).
- btrfs: qgroup: Introduce btrfs_qgroup_reserve_data function (bsc#963193).
- btrfs: qgroup: Introduce functions to release/free qgroup reserve data space (bsc#963193).
- btrfs: qgroup: Introduce new functions to reserve/free metadata (bsc#963193).
- btrfs: qgroup: Use new metadata reservation (bsc#963193).
- btrfs: skip locking when searching commit root (bnc#963825).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- documentation: Document kernel.panic_on_io_nmi sysctl (bsc#940946, bsc#937444).
- documentation: Fix build of PDF files in kernel-docs package Double the spaces for tex, and fix buildrequires for docbook.
- doc: Use fop for creating PDF files in kernel-docs package as some files still cannot be built with the default backend.
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#957986 fate#320625).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#957986 fate#320625).
- ec2: updated kabi files and start tracking
- fs: Improve fairness when locking the per-superblock s_anon list (bsc#957525, bsc#941363).
- fs/proc_namespace.c: simplify testing nsp and nsp->mnt_ns (bug#963960).
- fuse: break infinite loop in fuse_fill_write_pages() (bsc#963765).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bug#960174).
- jbd2: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi: Preserve checksum of kvm_x86_ops (bsc#969112).
- kABI: protect struct af_alg_type.
- kABI: protect struct crypto_ahash.
- kABI: reintroduce blk_rq_check_limits.
- kabi/severities: Fail on changes in kvm_x86_ops, needed by lttng-modules
- kernel: Change ASSIGN_ONCE(val, x) to WRITE_ONCE(x, val) (bsc#940946, bsc#937444).
- kernel: Provide READ_ONCE and ASSIGN_ONCE (bsc#940946, bsc#937444).
- kernel/watchdog.c: perform all-CPU backtrace in case of hard lockup (bsc#940946, bsc#937444).
- kexec: Fix race between panic() and crash_kexec() (bsc#940946, bsc#937444).
- kgr: do not print error for !abort_if_missing symbols (bnc#943989).
- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
- kgr: log when modifying kernel (fate#317827).
- kgr: mark some more missed kthreads (bnc#962336).
- kgr: usb/storage: do not emit thread awakened (bnc#899908).
- kvm: x86: Check dest_map->vector to match eoi signals for rtc (bsc#966471).
- kvm: x86: Convert ioapic->rtc_status.dest_map to a struct (bsc#966471).
- kvm: x86: store IOAPIC-handled vectors in each VCPU (bsc#966471).
- kvm: x86: Track irq vectors in ioapic->rtc_status.dest_map (bsc#966471).
- libceph: fix scatterlist last_piece calculation (bsc#963746).
- megaraid_sas: Chip reset if driver fails to get IOC ready (bsc#922071). Refresh the patch based on the actual upstream commit, and add the commit ID.
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (VM Functionality, bnc#961588).
- module: keep percpu symbols in module's symtab (bsc#962788).
- namespaces: Re-introduce task_nsproxy() helper (bug#963960).
- namespaces: Use task_lock and not rcu to protect nsproxy (bug#963960).
- net: core: Correct an over-stringent device loop detection (bsc#945219).
- nfs: Background flush should not be low priority (bsc#955308).
- nfsd: Do not start lockd when only NFSv4 is running (fate#316311).
- nfs: do not use STABLE writes during writeback (bnc#816099).
- nfs: Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfs: Move nfsd patch to the right section
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).
- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).
- panic, x86: Allow CPUs to save registers even if looping in NMI context (bsc#940946, bsc#937444).
- panic, x86: Fix re-entrance problem due to panic on NMI (bsc#940946, bsc#937444).
- pci: allow access to VPD attributes with size 0 (bsc#959146).
- pciback: Check PF instead of VF for PCI_COMMAND_MEMORY.
- pciback: Save the number of MSI-X entries to be copied later.
- pci: Blacklist vpd access for buggy devices (bsc#959146).
- pci: Determine actual VPD size on first access (bsc#959146).
- pci: Update VPD definitions (bsc#959146).
- perf: Do not modify perf bias performance setting by default at boot (bnc#812259,bsc#959629).
- proc: Fix ptrace-based permission checks for accessing task maps.
- rpm/constraints.in: Bump disk space requirements up a bit Require 10GB on s390x, 20GB elsewhere.
- rpm/kernel-binary.spec.in: Fix build if no UEFI certs are installed
- rpm/kernel-binary.spec.in: Fix kernel-vanilla-devel dependency (bsc#959090)
- rpm/kernel-binary.spec.in: Fix paths in kernel-vanilla-devel (bsc#959090).
- rpm/kernel-binary.spec.in: Install libopenssl-devel for newer sign-file
- rpm/kernel-binary.spec.in: Sync the main and -base package dependencies (bsc#965830#c51).
- rpm/kernel-binary.spec.in: Use bzip compression to speed up build (bsc#962356)
- rpm/kernel-module-subpackage: Fix obsoleting dropped flavors (bsc#968253)
- rpm/kernel-source.spec.in: Install kernel-macros for kernel-source-vanilla (bsc#959090)
- rpm/kernel-spec-macros: Do not modify the release string in PTFs (bsc#963449)
- rpm/package-descriptions: Add kernel-zfcpdump and drop -desktop
- sched/fair: Disable tg load_avg/runnable_avg update for root_task_group (bnc#960227).
- sched/fair: Move cache hot load_avg/runnable_avg into separate cacheline (bnc#960227).
- sched: Fix race between task_group and sched_task_group (Automatic NUMA Balancing (fate#315482))
- scsi: Add sd_mod to initrd modules For some reason PowerVM backend can't work without sd_mod
- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).
- scsi: fix soft lockup in scsi_remove_target() on module removal (bsc#965199).
- scsi: restart list search after unlock in scsi_remove_target (bsc#959257).
- series.conf: add section comments
- supported.conf: Add e1000e (emulated by VMware) to -base (bsc#968074)
- supported.conf: Add Hyper-V modules to -base (bsc#965830)
- supported.conf: Add more QEMU and VMware drivers to -base (bsc#965840).
- supported.conf: Add more qemu device driver (bsc#968234)
- supported.conf: Add mptspi and mptsas to -base (bsc#968206)
- supported.conf: Add netfilter modules to base (bsc#950292)
- supported.conf: Add nls_iso8859-1 and nls_cp437 to -base (bsc#950292)
- supported.conf: Add the qemu scsi driver (sym53c8xx) to -base (bsc#967802)
- supported.conf: Add tulip to -base for Hyper-V (bsc#968234)
- supported.conf: Add vfat to -base to be able to mount the ESP (bsc#950292).
- supported.conf: Add virtio_{blk,net,scsi} to kernel-default-base (bsc#950292)
- supported.conf: Add virtio-rng (bsc#966026)
- supported.conf: Add xen-blkfront.
- supported.conf: Add xfs to -base (bsc#965891)
- supported.conf: Also add virtio_pci to kernel-default-base (bsc#950292).
- supported.conf: drop +external from ghash-clmulni-intel It was agreed that it does not make sense to maintain 'external' for this specific module. Furthermore it causes problems in rather ordinary VMware environments. (bsc#961971)
- supported.conf: Fix usb-common path usb-common moved to its own subdirectory in kernel v3.16, and we backported that change to SLE12.
- tcp: Restore RFC5961-compliant behavior for SYN packets (bsc#966864).
- usb: Quiet down false peer failure messages (bnc#960629).
- x86/apic: Introduce apic_extnmi command line parameter (bsc#940946, bsc#937444).
- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).
- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).
- xen: Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).
- xen-blkfront: allow building in our Xen environment (bsc#957986 fate#320625).
- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#957986 fate#320625).
- xen-blkfront: fix accounting of reqs when migrating (bsc#957986 fate#320625).
- xen/blkfront: Fix crash if backend does not follow the right states (bsc#957986 fate#320625).
- xen-blkfront: improve aproximation of required grants per request (bsc#957986 fate#320625).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#957986 fate#320625).
- xen/blkfront: remove redundant flush_op (bsc#957986 fate#320625).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#957986 fate#320625).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#957986 fate#320625).
- xen: Linux 3.12.52.
- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#951155).
- xen: Refresh patches.xen/xen3-patch-3.9 (do not subvert NX protection during 1:1 mapping setup).
- xen-vscsi-large-requests: Fix resource collision for racing request maps and unmaps (bsc#966094).
- xen: Xen config files updated to enable upstream block frontend.
- xfs: add a few more verifier tests (bsc#947953).
- xfs: fix double free in xlog_recover_commit_trans (bsc#947953).
- xfs: recovery of XLOG_UNMOUNT_TRANS leaks memory (bsc#947953).
Patchnames
SUSE-SLE-DESKTOP-12-2016-460,SUSE-SLE-Live-Patching-12-2016-460,SUSE-SLE-Module-Public-Cloud-12-2016-460,SUSE-SLE-SDK-12-2016-460,SUSE-SLE-SERVER-12-2016-460,SUSE-SLE-WE-12-2016-460
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 kernel was updated to 3.12.55 to receive various security and bugfixes.\n\nFeatures added:\n- A improved XEN blkfront module was added, which allows more I/O bandwidth. (FATE#320625)\n It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode.\n\nThe following security bugs were fixed:\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in\n the Linux kernel allowed local users to bypass intended AF_UNIX socket\n permissions or cause a denial of service (panic) via crafted epoll_ctl\n calls (bnc#955654).\n- CVE-2015-5707: Integer overflow in the sg_start_req function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to cause a\n denial of service or possibly have unspecified other impact via a large\n iov_count value in a write request (bnc#940338).\n- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and\n gid mappings, which allowed local users to gain privileges by establishing\n a user namespace, waiting for a root process to enter that namespace\n with an unsafe uid or gid, and then using the ptrace system call. NOTE:\n the vendor states \u0027there is no kernel bug here\u0027 (bnc#959709 bnc#960561).\n- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not\n properly manage the relationship between a lock and a socket, which\n allowed local users to cause a denial of service (deadlock) via a crafted\n sctp_accept call (bnc#961509).\n- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c\n in the Linux kernel allowed local users to cause a denial of service\n (infinite loop) via a writev system call that triggers a zero length\n for the first segment of an iov (bnc#963765).\n- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel\n driver when the network was considered to be congested. This could be\n used by local attackers to cause machine crashes or potentially code\n executuon (bsc#966437).\n- CVE-2016-0723: Race condition in the tty_ioctl function in\n drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain\n sensitive information from kernel memory or cause a denial of service\n (use-after-free and system crash) by making a TIOCGETD ioctl call during\n processing of a TIOCSETD ioctl call (bnc#961500).\n- CVE-2016-0774: A pipe buffer state corruption after unsuccessful atomic\n read from pipe was fixed (bsc#964730).\n- CVE-2016-2069: Race conditions in TLB syncing was fixed which could\n leak to information leaks (bnc#963767).\n- CVE-2016-2384: A double-free triggered by invalid USB descriptor in\n ALSA usb-audio was fixed, which could be exploited by physical local\n attackers to crash the kernel or gain code execution (bnc#966693).\n\nThe following non-security bugs were fixed:\n- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).\n- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).\n- be2net: fix some log messages (bnc#855062 FATE#315961, bnc#867583).\n- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#957986 fate#320625).\n- btrfs: Add handler for invalidate page (bsc#963193).\n- btrfs: check prepare_uptodate_page() error code earlier (bnc#966910).\n- btrfs: delayed_ref: Add new function to record reserved space into delayed ref (bsc#963193).\n- btrfs: delayed_ref: release and free qgroup reserved at proper timing (bsc#963193).\n- btrfs: extent_io: Introduce needed structure for recoding set/clear bits (bsc#963193).\n- btrfs: extent_io: Introduce new function clear_record_extent_bits() (bsc#963193).\n- btrfs: extent_io: Introduce new function set_record_extent_bits (bsc#963193).\n- btrfs: extent-tree: Add new version of btrfs_check_data_free_space and btrfs_free_reserved_data_space (bsc#963193).\n- btrfs: extent-tree: Add new version of btrfs_delalloc_reserve/release_space (bsc#963193).\n- btrfs: extent-tree: Switch to new check_data_free_space and free_reserved_data_space (bsc#963193).\n- btrfs: extent-tree: Switch to new delalloc space reserve and release (bsc#963193).\n- btrfs: fallocate: Add support to accurate qgroup reserve (bsc#963193).\n- btrfs: fix deadlock between direct IO write and defrag/readpages (bnc#965344).\n- btrfs: fix invalid page accesses in extent_same (dedup) ioctl (bnc#968230).\n- btrfs: fix page reading in extent_same ioctl leading to csum errors (bnc#968230).\n- btrfs: fix warning in backref walking (bnc#966278).\n- btrfs: qgroup: Add handler for NOCOW and inline (bsc#963193).\n- btrfs: qgroup: Add new trace point for qgroup data reserve (bsc#963193).\n- btrfs: qgroup: Avoid calling btrfs_free_reserved_data_space in clear_bit_hook (bsc#963193).\n- btrfs: qgroup: Check if qgroup reserved space leaked (bsc#963193).\n- btrfs: qgroup: Cleanup old inaccurate facilities (bsc#963193).\n- btrfs: qgroup: Fix a race in delayed_ref which leads to abort trans (bsc#963193).\n- btrfs: qgroup: Fix a rebase bug which will cause qgroup double free (bsc#963193).\n- btrfs: qgroup: Introduce btrfs_qgroup_reserve_data function (bsc#963193).\n- btrfs: qgroup: Introduce functions to release/free qgroup reserve data space (bsc#963193).\n- btrfs: qgroup: Introduce new functions to reserve/free metadata (bsc#963193).\n- btrfs: qgroup: Use new metadata reservation (bsc#963193).\n- btrfs: skip locking when searching commit root (bnc#963825).\n- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).\n- documentation: Document kernel.panic_on_io_nmi sysctl (bsc#940946, bsc#937444).\n- documentation: Fix build of PDF files in kernel-docs package Double the spaces for tex, and fix buildrequires for docbook.\n- doc: Use fop for creating PDF files in kernel-docs package as some files still cannot be built with the default backend.\n- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).\n- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#957986 fate#320625).\n- driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#957986 fate#320625).\n- ec2: updated kabi files and start tracking\n- fs: Improve fairness when locking the per-superblock s_anon list (bsc#957525, bsc#941363).\n- fs/proc_namespace.c: simplify testing nsp and nsp-\u003emnt_ns (bug#963960).\n- fuse: break infinite loop in fuse_fill_write_pages() (bsc#963765).\n- futex: Drop refcount if requeue_pi() acquired the rtmutex (bug#960174).\n- jbd2: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).\n- kabi: Preserve checksum of kvm_x86_ops (bsc#969112).\n- kABI: protect struct af_alg_type.\n- kABI: protect struct crypto_ahash.\n- kABI: reintroduce blk_rq_check_limits.\n- kabi/severities: Fail on changes in kvm_x86_ops, needed by lttng-modules\n- kernel: Change ASSIGN_ONCE(val, x) to WRITE_ONCE(x, val) (bsc#940946, bsc#937444).\n- kernel: Provide READ_ONCE and ASSIGN_ONCE (bsc#940946, bsc#937444).\n- kernel/watchdog.c: perform all-CPU backtrace in case of hard lockup (bsc#940946, bsc#937444).\n- kexec: Fix race between panic() and crash_kexec() (bsc#940946, bsc#937444).\n- kgr: do not print error for !abort_if_missing symbols (bnc#943989).\n- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).\n- kgr: log when modifying kernel (fate#317827).\n- kgr: mark some more missed kthreads (bnc#962336).\n- kgr: usb/storage: do not emit thread awakened (bnc#899908).\n- kvm: x86: Check dest_map-\u003evector to match eoi signals for rtc (bsc#966471).\n- kvm: x86: Convert ioapic-\u003ertc_status.dest_map to a struct (bsc#966471).\n- kvm: x86: store IOAPIC-handled vectors in each VCPU (bsc#966471).\n- kvm: x86: Track irq vectors in ioapic-\u003ertc_status.dest_map (bsc#966471).\n- libceph: fix scatterlist last_piece calculation (bsc#963746).\n- megaraid_sas: Chip reset if driver fails to get IOC ready (bsc#922071). Refresh the patch based on the actual upstream commit, and add the commit ID.\n- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (VM Functionality, bnc#961588).\n- module: keep percpu symbols in module\u0027s symtab (bsc#962788).\n- namespaces: Re-introduce task_nsproxy() helper (bug#963960).\n- namespaces: Use task_lock and not rcu to protect nsproxy (bug#963960).\n- net: core: Correct an over-stringent device loop detection (bsc#945219).\n- nfs: Background flush should not be low priority (bsc#955308).\n- nfsd: Do not start lockd when only NFSv4 is running (fate#316311).\n- nfs: do not use STABLE writes during writeback (bnc#816099).\n- nfs: Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).\n- nfs: Move nfsd patch to the right section\n- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).\n- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).\n- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).\n- panic, x86: Allow CPUs to save registers even if looping in NMI context (bsc#940946, bsc#937444).\n- panic, x86: Fix re-entrance problem due to panic on NMI (bsc#940946, bsc#937444).\n- pci: allow access to VPD attributes with size 0 (bsc#959146).\n- pciback: Check PF instead of VF for PCI_COMMAND_MEMORY.\n- pciback: Save the number of MSI-X entries to be copied later.\n- pci: Blacklist vpd access for buggy devices (bsc#959146).\n- pci: Determine actual VPD size on first access (bsc#959146).\n- pci: Update VPD definitions (bsc#959146).\n- perf: Do not modify perf bias performance setting by default at boot (bnc#812259,bsc#959629).\n- proc: Fix ptrace-based permission checks for accessing task maps.\n- rpm/constraints.in: Bump disk space requirements up a bit Require 10GB on s390x, 20GB elsewhere.\n- rpm/kernel-binary.spec.in: Fix build if no UEFI certs are installed\n- rpm/kernel-binary.spec.in: Fix kernel-vanilla-devel dependency (bsc#959090)\n- rpm/kernel-binary.spec.in: Fix paths in kernel-vanilla-devel (bsc#959090).\n- rpm/kernel-binary.spec.in: Install libopenssl-devel for newer sign-file\n- rpm/kernel-binary.spec.in: Sync the main and -base package dependencies (bsc#965830#c51).\n- rpm/kernel-binary.spec.in: Use bzip compression to speed up build (bsc#962356)\n- rpm/kernel-module-subpackage: Fix obsoleting dropped flavors (bsc#968253)\n- rpm/kernel-source.spec.in: Install kernel-macros for kernel-source-vanilla (bsc#959090)\n- rpm/kernel-spec-macros: Do not modify the release string in PTFs (bsc#963449)\n- rpm/package-descriptions: Add kernel-zfcpdump and drop -desktop\n- sched/fair: Disable tg load_avg/runnable_avg update for root_task_group (bnc#960227).\n- sched/fair: Move cache hot load_avg/runnable_avg into separate cacheline (bnc#960227).\n- sched: Fix race between task_group and sched_task_group (Automatic NUMA Balancing (fate#315482))\n- scsi: Add sd_mod to initrd modules For some reason PowerVM backend can\u0027t work without sd_mod\n- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).\n- scsi: fix soft lockup in scsi_remove_target() on module removal (bsc#965199).\n- scsi: restart list search after unlock in scsi_remove_target (bsc#959257).\n- series.conf: add section comments\n- supported.conf: Add e1000e (emulated by VMware) to -base (bsc#968074)\n- supported.conf: Add Hyper-V modules to -base (bsc#965830)\n- supported.conf: Add more QEMU and VMware drivers to -base (bsc#965840).\n- supported.conf: Add more qemu device driver (bsc#968234)\n- supported.conf: Add mptspi and mptsas to -base (bsc#968206)\n- supported.conf: Add netfilter modules to base (bsc#950292)\n- supported.conf: Add nls_iso8859-1 and nls_cp437 to -base (bsc#950292)\n- supported.conf: Add the qemu scsi driver (sym53c8xx) to -base (bsc#967802)\n- supported.conf: Add tulip to -base for Hyper-V (bsc#968234)\n- supported.conf: Add vfat to -base to be able to mount the ESP (bsc#950292).\n- supported.conf: Add virtio_{blk,net,scsi} to kernel-default-base (bsc#950292)\n- supported.conf: Add virtio-rng (bsc#966026)\n- supported.conf: Add xen-blkfront.\n- supported.conf: Add xfs to -base (bsc#965891)\n- supported.conf: Also add virtio_pci to kernel-default-base (bsc#950292).\n- supported.conf: drop +external from ghash-clmulni-intel It was agreed that it does not make sense to maintain \u0027external\u0027 for this specific module. Furthermore it causes problems in rather ordinary VMware environments. (bsc#961971)\n- supported.conf: Fix usb-common path usb-common moved to its own subdirectory in kernel v3.16, and we backported that change to SLE12.\n- tcp: Restore RFC5961-compliant behavior for SYN packets (bsc#966864).\n- usb: Quiet down false peer failure messages (bnc#960629).\n- x86/apic: Introduce apic_extnmi command line parameter (bsc#940946, bsc#937444).\n- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).\n- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).\n- xen: Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).\n- xen-blkfront: allow building in our Xen environment (bsc#957986 fate#320625).\n- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#957986 fate#320625).\n- xen-blkfront: fix accounting of reqs when migrating (bsc#957986 fate#320625).\n- xen/blkfront: Fix crash if backend does not follow the right states (bsc#957986 fate#320625).\n- xen-blkfront: improve aproximation of required grants per request (bsc#957986 fate#320625).\n- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#957986 fate#320625).\n- xen/blkfront: remove redundant flush_op (bsc#957986 fate#320625).\n- xen-blkfront: remove type check from blkfront_setup_discard (bsc#957986 fate#320625).\n- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#957986 fate#320625).\n- xen: Linux 3.12.52.\n- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#951155).\n- xen: Refresh patches.xen/xen3-patch-3.9 (do not subvert NX protection during 1:1 mapping setup).\n- xen-vscsi-large-requests: Fix resource collision for racing request maps and unmaps (bsc#966094).\n- xen: Xen config files updated to enable upstream block frontend.\n- xfs: add a few more verifier tests (bsc#947953).\n- xfs: fix double free in xlog_recover_commit_trans (bsc#947953).\n- xfs: recovery of XLOG_UNMOUNT_TRANS leaks memory (bsc#947953).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2016-460,SUSE-SLE-Live-Patching-12-2016-460,SUSE-SLE-Module-Public-Cloud-12-2016-460,SUSE-SLE-SDK-12-2016-460,SUSE-SLE-SERVER-12-2016-460,SUSE-SLE-WE-12-2016-460", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0785-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0785-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160785-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0785-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-March/001947.html" }, { "category": "self", "summary": "SUSE Bug 812259", "url": "https://bugzilla.suse.com/812259" }, { "category": "self", "summary": "SUSE Bug 816099", "url": "https://bugzilla.suse.com/816099" }, { "category": "self", "summary": "SUSE Bug 855062", "url": "https://bugzilla.suse.com/855062" }, { "category": "self", "summary": "SUSE Bug 867583", "url": "https://bugzilla.suse.com/867583" }, { "category": "self", "summary": "SUSE Bug 884701", "url": "https://bugzilla.suse.com/884701" }, { "category": "self", "summary": "SUSE Bug 899908", "url": "https://bugzilla.suse.com/899908" }, { "category": "self", "summary": "SUSE Bug 922071", "url": "https://bugzilla.suse.com/922071" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940946", "url": "https://bugzilla.suse.com/940946" }, { "category": "self", "summary": "SUSE Bug 941363", "url": "https://bugzilla.suse.com/941363" }, { "category": "self", "summary": "SUSE Bug 943989", "url": "https://bugzilla.suse.com/943989" }, { "category": "self", "summary": "SUSE Bug 945219", "url": "https://bugzilla.suse.com/945219" }, { "category": "self", "summary": "SUSE Bug 947953", "url": "https://bugzilla.suse.com/947953" }, { "category": "self", "summary": "SUSE Bug 949752", "url": "https://bugzilla.suse.com/949752" }, { "category": "self", "summary": "SUSE Bug 950292", "url": "https://bugzilla.suse.com/950292" }, { "category": "self", "summary": "SUSE Bug 951155", "url": "https://bugzilla.suse.com/951155" }, { "category": "self", "summary": "SUSE Bug 955308", "url": "https://bugzilla.suse.com/955308" }, { "category": "self", "summary": "SUSE Bug 955654", "url": "https://bugzilla.suse.com/955654" }, { "category": "self", "summary": "SUSE Bug 956084", "url": "https://bugzilla.suse.com/956084" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 957525", "url": "https://bugzilla.suse.com/957525" }, { "category": "self", "summary": "SUSE Bug 957986", "url": "https://bugzilla.suse.com/957986" }, { "category": "self", "summary": "SUSE Bug 959090", "url": "https://bugzilla.suse.com/959090" }, { "category": "self", "summary": "SUSE Bug 959146", "url": "https://bugzilla.suse.com/959146" }, { "category": "self", "summary": "SUSE Bug 959257", "url": "https://bugzilla.suse.com/959257" }, { "category": "self", "summary": "SUSE Bug 959463", "url": "https://bugzilla.suse.com/959463" }, { "category": "self", "summary": "SUSE Bug 959629", "url": "https://bugzilla.suse.com/959629" }, { "category": "self", "summary": "SUSE Bug 959709", "url": "https://bugzilla.suse.com/959709" }, { "category": "self", "summary": "SUSE Bug 960174", "url": "https://bugzilla.suse.com/960174" }, { "category": "self", "summary": "SUSE Bug 960227", "url": "https://bugzilla.suse.com/960227" }, { "category": "self", "summary": "SUSE Bug 960458", "url": "https://bugzilla.suse.com/960458" }, { "category": "self", "summary": "SUSE Bug 960561", "url": "https://bugzilla.suse.com/960561" }, { "category": "self", "summary": "SUSE Bug 960629", "url": "https://bugzilla.suse.com/960629" }, { "category": "self", "summary": "SUSE Bug 961257", "url": "https://bugzilla.suse.com/961257" }, { "category": "self", "summary": "SUSE Bug 961500", "url": "https://bugzilla.suse.com/961500" }, { "category": "self", "summary": "SUSE Bug 961509", "url": "https://bugzilla.suse.com/961509" }, { "category": "self", "summary": "SUSE Bug 961516", "url": "https://bugzilla.suse.com/961516" }, { "category": "self", "summary": "SUSE Bug 961588", "url": "https://bugzilla.suse.com/961588" }, { "category": "self", "summary": "SUSE Bug 961658", "url": "https://bugzilla.suse.com/961658" }, { "category": "self", "summary": "SUSE Bug 961971", "url": "https://bugzilla.suse.com/961971" }, { "category": "self", "summary": "SUSE Bug 962336", "url": "https://bugzilla.suse.com/962336" }, { "category": "self", "summary": "SUSE Bug 962356", "url": "https://bugzilla.suse.com/962356" }, { "category": "self", "summary": "SUSE Bug 962788", "url": "https://bugzilla.suse.com/962788" }, { "category": "self", "summary": "SUSE Bug 962965", "url": "https://bugzilla.suse.com/962965" }, { "category": "self", "summary": "SUSE Bug 963193", "url": "https://bugzilla.suse.com/963193" }, { "category": "self", "summary": "SUSE Bug 963449", "url": "https://bugzilla.suse.com/963449" }, { "category": "self", "summary": "SUSE Bug 963572", "url": "https://bugzilla.suse.com/963572" }, { "category": "self", "summary": "SUSE Bug 963746", "url": "https://bugzilla.suse.com/963746" }, { "category": "self", "summary": "SUSE Bug 963765", "url": "https://bugzilla.suse.com/963765" }, { "category": "self", "summary": "SUSE Bug 963767", "url": "https://bugzilla.suse.com/963767" }, { "category": "self", "summary": "SUSE Bug 963825", "url": "https://bugzilla.suse.com/963825" }, { "category": "self", "summary": "SUSE Bug 963960", "url": "https://bugzilla.suse.com/963960" }, { "category": "self", "summary": "SUSE Bug 964201", "url": "https://bugzilla.suse.com/964201" }, { "category": "self", "summary": "SUSE Bug 964730", "url": "https://bugzilla.suse.com/964730" }, { "category": "self", "summary": "SUSE Bug 965199", "url": "https://bugzilla.suse.com/965199" }, { "category": "self", "summary": "SUSE Bug 965344", "url": "https://bugzilla.suse.com/965344" }, { "category": "self", "summary": "SUSE Bug 965830", "url": "https://bugzilla.suse.com/965830" }, { "category": "self", "summary": "SUSE Bug 965840", "url": "https://bugzilla.suse.com/965840" }, { "category": "self", "summary": "SUSE Bug 965891", "url": "https://bugzilla.suse.com/965891" }, { "category": "self", "summary": "SUSE Bug 966026", "url": "https://bugzilla.suse.com/966026" }, { "category": "self", "summary": "SUSE Bug 966094", "url": "https://bugzilla.suse.com/966094" }, { "category": "self", "summary": "SUSE Bug 966278", "url": "https://bugzilla.suse.com/966278" }, { "category": "self", "summary": "SUSE Bug 966437", "url": "https://bugzilla.suse.com/966437" }, { "category": "self", "summary": "SUSE Bug 966471", "url": "https://bugzilla.suse.com/966471" }, { "category": "self", "summary": "SUSE Bug 966693", "url": "https://bugzilla.suse.com/966693" }, { "category": "self", "summary": "SUSE Bug 966864", "url": "https://bugzilla.suse.com/966864" }, { "category": "self", "summary": "SUSE Bug 966910", "url": "https://bugzilla.suse.com/966910" }, { "category": "self", "summary": "SUSE Bug 967802", "url": "https://bugzilla.suse.com/967802" }, { "category": "self", "summary": "SUSE Bug 968018", "url": "https://bugzilla.suse.com/968018" }, { "category": "self", "summary": "SUSE Bug 968074", "url": "https://bugzilla.suse.com/968074" }, { "category": "self", "summary": "SUSE Bug 968206", "url": "https://bugzilla.suse.com/968206" }, { "category": "self", "summary": "SUSE Bug 968230", "url": "https://bugzilla.suse.com/968230" }, { "category": "self", "summary": "SUSE Bug 968234", "url": "https://bugzilla.suse.com/968234" }, { "category": "self", "summary": "SUSE Bug 968253", "url": "https://bugzilla.suse.com/968253" }, { "category": "self", "summary": "SUSE Bug 969112", "url": "https://bugzilla.suse.com/969112" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8709 page", "url": "https://www.suse.com/security/cve/CVE-2015-8709/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8767 page", "url": "https://www.suse.com/security/cve/CVE-2015-8767/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8785 page", "url": "https://www.suse.com/security/cve/CVE-2015-8785/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8812 page", "url": "https://www.suse.com/security/cve/CVE-2015-8812/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0723 page", "url": "https://www.suse.com/security/cve/CVE-2016-0723/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0774 page", "url": "https://www.suse.com/security/cve/CVE-2016-0774/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2069 page", "url": "https://www.suse.com/security/cve/CVE-2016-2069/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2384 page", "url": "https://www.suse.com/security/cve/CVE-2016-2384/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-03-16T10:39:32Z", "generator": { "date": "2016-03-16T10:39:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0785-1", "initial_release_date": "2016-03-16T10:39:32Z", "revision_history": [ { "date": "2016-03-16T10:39:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.55-52.42.1.noarch", "product": { "name": "kernel-devel-3.12.55-52.42.1.noarch", "product_id": "kernel-devel-3.12.55-52.42.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.55-52.42.1.noarch", "product": { "name": "kernel-macros-3.12.55-52.42.1.noarch", "product_id": "kernel-macros-3.12.55-52.42.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.55-52.42.1.noarch", "product": { "name": "kernel-source-3.12.55-52.42.1.noarch", "product_id": "kernel-source-3.12.55-52.42.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.55-52.42.2.noarch", "product": { "name": "kernel-docs-3.12.55-52.42.2.noarch", "product_id": "kernel-docs-3.12.55-52.42.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.55-52.42.2.ppc64le", "product": { "name": "kernel-obs-build-3.12.55-52.42.2.ppc64le", "product_id": "kernel-obs-build-3.12.55-52.42.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.55-52.42.1.ppc64le", "product": { "name": "kernel-default-3.12.55-52.42.1.ppc64le", "product_id": "kernel-default-3.12.55-52.42.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.55-52.42.1.ppc64le", "product": { "name": "kernel-default-base-3.12.55-52.42.1.ppc64le", "product_id": "kernel-default-base-3.12.55-52.42.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.55-52.42.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.55-52.42.1.ppc64le", "product_id": "kernel-default-devel-3.12.55-52.42.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.55-52.42.1.ppc64le", "product": { "name": "kernel-syms-3.12.55-52.42.1.ppc64le", "product_id": "kernel-syms-3.12.55-52.42.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.55-52.42.2.s390x", "product": { "name": "kernel-obs-build-3.12.55-52.42.2.s390x", "product_id": "kernel-obs-build-3.12.55-52.42.2.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.55-52.42.1.s390x", "product": { "name": "kernel-default-3.12.55-52.42.1.s390x", "product_id": "kernel-default-3.12.55-52.42.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.55-52.42.1.s390x", "product": { "name": "kernel-default-base-3.12.55-52.42.1.s390x", "product_id": "kernel-default-base-3.12.55-52.42.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.55-52.42.1.s390x", "product": { "name": "kernel-default-devel-3.12.55-52.42.1.s390x", "product_id": "kernel-default-devel-3.12.55-52.42.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.55-52.42.1.s390x", "product": { "name": "kernel-default-man-3.12.55-52.42.1.s390x", "product_id": "kernel-default-man-3.12.55-52.42.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.55-52.42.1.s390x", "product": { "name": "kernel-syms-3.12.55-52.42.1.s390x", "product_id": "kernel-syms-3.12.55-52.42.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-default-3.12.55-52.42.1.x86_64", "product_id": "kernel-default-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-default-devel-3.12.55-52.42.1.x86_64", "product_id": "kernel-default-devel-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-default-extra-3.12.55-52.42.1.x86_64", "product_id": "kernel-default-extra-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-syms-3.12.55-52.42.1.x86_64", "product_id": "kernel-syms-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-xen-3.12.55-52.42.1.x86_64", "product_id": "kernel-xen-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.55-52.42.1.x86_64", "product_id": "kernel-xen-devel-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-ec2-3.12.55-52.42.1.x86_64", "product_id": "kernel-ec2-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.55-52.42.1.x86_64", "product_id": "kernel-ec2-devel-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.55-52.42.1.x86_64", "product_id": "kernel-ec2-extra-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.55-52.42.2.x86_64", "product": { "name": "kernel-obs-build-3.12.55-52.42.2.x86_64", "product_id": "kernel-obs-build-3.12.55-52.42.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-default-base-3.12.55-52.42.1.x86_64", "product_id": "kernel-default-base-3.12.55-52.42.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.55-52.42.1.x86_64", "product": { "name": "kernel-xen-base-3.12.55-52.42.1.x86_64", "product_id": "kernel-xen-base-3.12.55-52.42.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.55-52.42.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch" }, "product_reference": "kernel-devel-3.12.55-52.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.55-52.42.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch" }, "product_reference": "kernel-macros-3.12.55-52.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.55-52.42.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch" }, "product_reference": "kernel-source-3.12.55-52.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-syms-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-xen-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-ec2-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.55-52.42.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch" }, "product_reference": "kernel-docs-3.12.55-52.42.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.55-52.42.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le" }, "product_reference": "kernel-obs-build-3.12.55-52.42.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.55-52.42.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x" }, "product_reference": "kernel-obs-build-3.12.55-52.42.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.55-52.42.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64" }, "product_reference": "kernel-obs-build-3.12.55-52.42.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.42.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le" }, "product_reference": "kernel-default-3.12.55-52.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-default-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.42.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.55-52.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-default-base-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-base-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.42.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.55-52.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-default-devel-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-default-man-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.55-52.42.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch" }, "product_reference": "kernel-devel-3.12.55-52.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.55-52.42.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch" }, "product_reference": "kernel-macros-3.12.55-52.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.55-52.42.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch" }, "product_reference": "kernel-source-3.12.55-52.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.42.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le" }, "product_reference": "kernel-syms-3.12.55-52.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-syms-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-syms-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-xen-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le" }, "product_reference": "kernel-default-3.12.55-52.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-default-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.55-52.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-default-base-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-base-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.55-52.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-default-devel-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-default-man-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.55-52.42.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch" }, "product_reference": "kernel-devel-3.12.55-52.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.55-52.42.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch" }, "product_reference": "kernel-macros-3.12.55-52.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.55-52.42.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch" }, "product_reference": "kernel-source-3.12.55-52.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le" }, "product_reference": "kernel-syms-3.12.55-52.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.42.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x" }, "product_reference": "kernel-syms-3.12.55-52.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-syms-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-xen-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.55-52.42.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.55-52.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-8709", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8709" } ], "notes": [ { "category": "general", "text": "kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states \"there is no kernel bug here.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8709", "url": "https://www.suse.com/security/cve/CVE-2015-8709" }, { "category": "external", "summary": "SUSE Bug 1010933 for CVE-2015-8709", "url": "https://bugzilla.suse.com/1010933" }, { "category": "external", "summary": "SUSE Bug 959709 for CVE-2015-8709", "url": "https://bugzilla.suse.com/959709" }, { "category": "external", "summary": "SUSE Bug 960561 for CVE-2015-8709", "url": "https://bugzilla.suse.com/960561" }, { "category": "external", "summary": "SUSE Bug 960563 for CVE-2015-8709", "url": "https://bugzilla.suse.com/960563" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "moderate" } ], "title": "CVE-2015-8709" }, { "cve": "CVE-2015-8767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8767" } ], "notes": [ { "category": "general", "text": "net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8767", "url": "https://www.suse.com/security/cve/CVE-2015-8767" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8767", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8767", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 961509 for CVE-2015-8767", "url": "https://bugzilla.suse.com/961509" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "low" } ], "title": "CVE-2015-8767" }, { "cve": "CVE-2015-8785", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8785" } ], "notes": [ { "category": "general", "text": "The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8785", "url": "https://www.suse.com/security/cve/CVE-2015-8785" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8785", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963765 for CVE-2015-8785", "url": "https://bugzilla.suse.com/963765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "low" } ], "title": "CVE-2015-8785" }, { "cve": "CVE-2015-8812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8812" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8812", "url": "https://www.suse.com/security/cve/CVE-2015-8812" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8812", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8812", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 966437 for CVE-2015-8812", "url": "https://bugzilla.suse.com/966437" }, { "category": "external", "summary": "SUSE Bug 966683 for CVE-2015-8812", "url": "https://bugzilla.suse.com/966683" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "moderate" } ], "title": "CVE-2015-8812" }, { "cve": "CVE-2016-0723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0723" } ], "notes": [ { "category": "general", "text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0723", "url": "https://www.suse.com/security/cve/CVE-2016-0723" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0723", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961500 for CVE-2016-0723", "url": "https://bugzilla.suse.com/961500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "low" } ], "title": "CVE-2016-0723" }, { "cve": "CVE-2016-0774", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0774" } ], "notes": [ { "category": "general", "text": "The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an \"I/O vector array overrun.\" NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0774", "url": "https://www.suse.com/security/cve/CVE-2016-0774" }, { "category": "external", "summary": "SUSE Bug 917839 for CVE-2016-0774", "url": "https://bugzilla.suse.com/917839" }, { "category": "external", "summary": "SUSE Bug 964730 for CVE-2016-0774", "url": "https://bugzilla.suse.com/964730" }, { "category": "external", "summary": "SUSE Bug 964732 for CVE-2016-0774", "url": "https://bugzilla.suse.com/964732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "moderate" } ], "title": "CVE-2016-0774" }, { "cve": "CVE-2016-2069", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2069" } ], "notes": [ { "category": "general", "text": "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2069", "url": "https://www.suse.com/security/cve/CVE-2016-2069" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-2069", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 963767 for CVE-2016-2069", "url": "https://bugzilla.suse.com/963767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "low" } ], "title": "CVE-2016-2069" }, { "cve": "CVE-2016-2384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2384" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2384", "url": "https://www.suse.com/security/cve/CVE-2016-2384" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2384", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 966693 for CVE-2016-2384", "url": "https://bugzilla.suse.com/966693" }, { "category": "external", "summary": "SUSE Bug 967773 for CVE-2016-2384", "url": "https://bugzilla.suse.com/967773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_42-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.42.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.42.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.42.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.42.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-03-16T10:39:32Z", "details": "low" } ], "title": "CVE-2016-2384" } ] }
suse-su-2015:2086-1
Vulnerability from csaf_suse
Published
2015-11-24 14:48
Modified
2015-11-24 14:48
Summary
Security update for Linux Kernel Live Patch 7
Notes
Title of the patch
Security update for Linux Kernel Live Patch 7
Description of the patch
This kernel live patch for Linux Kernel 3.12.44-52.18.1 fixes two security issues:
- CVE-2015-7613: A race condition in the IPC object implementation in
the Linux kernel allowed local users to gain privileges by triggering an
ipc_addid call that leads to uid and gid comparisons against uninitialized
data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)
- CVE-2015-5707: Integer overflow in the sg_start_req function in
drivers/scsi/sg.c in the Linux kernel allowed local users to cause a
denial of service or possibly have unspecified other impact via a large
iov_count value in a write request. (bsc#940342 bsc#940338)
Patchnames
SUSE-SLE-Live-Patching-12-2015-889
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 7", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.44-52.18.1 fixes two security issues:\n\n- CVE-2015-7613: A race condition in the IPC object implementation in\n the Linux kernel allowed local users to gain privileges by triggering an\n ipc_addid call that leads to uid and gid comparisons against uninitialized\n data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)\n- CVE-2015-5707: Integer overflow in the sg_start_req function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to cause a\n denial of service or possibly have unspecified other impact via a large\n iov_count value in a write request. (bsc#940342 bsc#940338)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2015-889", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2086-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2086-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152086-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2086-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-November/001694.html" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 948536", "url": "https://bugzilla.suse.com/948536" }, { "category": "self", "summary": "SUSE Bug 948701", "url": "https://bugzilla.suse.com/948701" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7613 page", "url": "https://www.suse.com/security/cve/CVE-2015-7613/" } ], "title": "Security update for Linux Kernel Live Patch 7", "tracking": { "current_release_date": "2015-11-24T14:48:45Z", "generator": { "date": "2015-11-24T14:48:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2086-1", "initial_release_date": "2015-11-24T14:48:45Z", "revision_history": [ { "date": "2015-11-24T14:48:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:48:45Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-7613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7613" } ], "notes": [ { "category": "general", "text": "Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7613", "url": "https://www.suse.com/security/cve/CVE-2015-7613" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-7613", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 948536 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948536" }, { "category": "external", "summary": "SUSE Bug 948701 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948701" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-7613", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-2-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:48:45Z", "details": "important" } ], "title": "CVE-2015-7613" } ] }
suse-su-2015:1478-1
Vulnerability from csaf_suse
Published
2015-08-20 15:22
Modified
2015-08-20 15:22
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise Server 11 SP2 LTSS kernel was updated to
receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2015-5707: An integer overflow in the SCSI generic driver could
be potentially used by local attackers to crash the kernel or execute
code.
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
not prevent the TS_COMPAT flag from reaching a user-mode task, which
might have allowed local users to bypass the seccomp or audit protection
mechanism via a crafted application that uses the (1) fork or (2) close
system call, as demonstrated by an attack against seccomp before 3.16
(bnc#926240).
- CVE-2015-0777: drivers/xen/usbback/usbback.c in the Linux kernel
allowed guest OS users to obtain sensitive information from uninitialized
locations in host OS kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2150: Xen and the Linux kernel did not properly restrict access
to PCI command registers, which might have allowed local guest users to
cause a denial of service (non-maskable interrupt and host crash) by
disabling the (1) memory or (2) I/O decoding for a PCI Express device
and then accessing the device, which triggers an Unsupported Request
(UR) response (bnc#919463).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: CVE-2015-1420: Race condition in the handle_to_path
function in fs/fhandle.c in the Linux kernel allowed local users to bypass
intended size restrictions and trigger read operations on additional
memory locations by changing the handle_bytes value of a file handle
during the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
fs/pipe.c in the Linux kernel did not properly consider the side effects
of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls,
which allowed local users to cause a denial of service (system crash)
or possibly gain privileges via a crafted application, aka an 'I/O vector
array overrun' (bnc#933429).
- CVE-2015-3331: The __driver_rfc4106_decrypt function in
arch/x86/crypto/aesni-intel_glue.c in the Linux kernel did not properly
determine the memory locations used for encrypted data, which allowed
context-dependent attackers to cause a denial of service (buffer overflow
and system crash) or possibly execute arbitrary code by triggering a
crypto API call, as demonstrated by use of a libkcapi test program with
an AF_ALG(aead) socket (bnc#927257).
- CVE-2015-2922: The ndisc_router_discovery function in net/ipv6/ndisc.c
in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack
in the Linux kernel allowed remote attackers to reconfigure a hop-limit
setting via a small hop_limit value in a Router Advertisement (RA)
message (bnc#922583).
- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel used an
incorrect data type in a sysctl table, which allowed local users to
obtain potentially sensitive information from kernel memory or possibly
have unspecified other impact by accessing a sysctl entry (bnc#919007).
- CVE-2015-3636: The ping_unhash function in net/ipv4/ping.c in the
Linux kernel did not initialize a certain list data structure during an
unhash operation, which allowed local users to gain privileges or cause
a denial of service (use-after-free and system crash) by leveraging the
ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or
IPPROTO_ICMPV6 protocol, and then making a connect system call after a
disconnect (bnc#929525).
- CVE-2014-8086: Race condition in the ext4_file_write_iter function
in fs/ext4/file.c in the Linux kernel allowed local users to cause a
denial of service (file unavailability) via a combination of a write
action and an F_SETFL fcntl operation for the O_DIRECT flag (bnc#900881).
- CVE-2014-8159: The InfiniBand (IB) implementation in the Linux kernel
did not properly restrict use of User Verbs for registration of memory
regions, which allowed local users to access arbitrary physical memory
locations, and consequently cause a denial of service (system crash)
or gain privileges, by leveraging permissions on a uverbs device under
/dev/infiniband/ (bnc#914742).
- CVE-2014-9683: Off-by-one error in the ecryptfs_decode_from_filename
function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux
kernel allowed local users to cause a denial of service (buffer overflow
and system crash) or possibly gain privileges via a crafted filename
(bnc#918333).
- CVE-2015-2042: net/rds/sysctl.c in the Linux kernel used an incorrect
data type in a sysctl table, which allowed local users to obtain
potentially sensitive information from kernel memory or possibly have
unspecified other impact by accessing a sysctl entry (bnc#919018).
- CVE-2015-1421: Use-after-free vulnerability in the sctp_assoc_update
function in net/sctp/associola.c in the Linux kernel allowed remote
attackers to cause a denial of service (slab corruption and panic) or
possibly have unspecified other impact by triggering an INIT collision
that leads to improper handling of shared-key data (bnc#915577).
The following non-security bugs were fixed:
- HID: add ALWAYS_POLL quirk for a Logitech 0xc007 (bnc#931474).
- HID: add HP OEM mouse to quirk ALWAYS_POLL (bnc#931474).
- HID: add quirk for PIXART OEM mouse used by HP (bnc#931474).
- HID: usbhid: add always-poll quirk (bnc#931474).
- HID: usbhid: add another mouse that needs QUIRK_ALWAYS_POLL (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 009b (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 0103 (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 016f (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen.
- HID: usbhid: fix PIXART optical mouse (bnc#931474).
- HID: usbhid: more mice with ALWAYS_POLL (bnc#931474).
- HID: usbhid: yet another mouse with ALWAYS_POLL (bnc#931474).
- bnx2x: Fix kdump when iommu=on (bug#921769).
- cifs: fix use-after-free bug in find_writable_file (bnc#909477).
- coredump: ensure the fpu state is flushed for proper multi-threaded core dump (bsc#904671, bsc#929360).
- dm: fixed that LVM merge snapshot of root logical volume were not working (bsc#928801)
- deal with deadlock in d_walk fix (bnc#929148, bnc#929283).
- e1000: do not enable dma receives until after dma address has been setup (bsc#821931).
- fsnotify: Fix handling of renames in audit (bnc#915200).
- inet: add a redirect generation id in inetpeer (bnc#860593).
- inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593).
- kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593).
- kernel: fix data corruption when reading /proc/sysinfo (bsc#891087, bsc#937986, LTC#114480).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- time, ntp: Do not update time_state in middle of leap second (bsc#912916).
- s390-3215-tty-close-crash.patch: kernel: 3215 tty close crash (bsc#916010, LTC#120873).
- s390-3215-tty-close-race.patch: kernel: 3215 console crash (bsc#916010, LTC#94302).
- s390-3215-tty-hang.patch: Renamed from patches.arch/s390-tty-hang.patch.
- s390-3215-tty-hang.patch: Update references (bnc#898693, bnc#897995, LTC#114562).
- s390-dasd-retry-partition-detection.patch: s390/dasd: retry partition detection (bsc#916010, LTC#94302).
- s390-dasd-retry-partition-detection.patch: Update references (bsc#916010, LTC#120565).
- s390-sclp-tty-refcount.patch: kernel: sclp console tty reference counting (bsc#916010, LTC#115466).
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- scsi/sg: sg_start_req(): make sure that there is not too many elements in iovec (bsc#940338).
- x86, xsave: remove thread_has_fpu() bug check in __sanitize_i387_state() (bsc#904671, bsc#929360).
- x86-mm-send-tlb-flush-ipis-to-online-cpus-only.patch: x86, mm: Send tlb flush IPIs to online cpus only (bnc#798406).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/reboot: Fix a warning message triggered by stop_other_cpus() (bnc#930284).
- xen: Correctly re-enable interrupts in xen_spin_wait() (bsc#879878, bsc#908870).
- xfs: prevent deadlock trying to cover an active log (bsc#917093).
Patchnames
slessp2-kernel-20150819-12065
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise Server 11 SP2 LTSS kernel was updated to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2015-5707: An integer overflow in the SCSI generic driver could\n be potentially used by local attackers to crash the kernel or execute\n code.\n- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did\n not prevent the TS_COMPAT flag from reaching a user-mode task, which\n might have allowed local users to bypass the seccomp or audit protection\n mechanism via a crafted application that uses the (1) fork or (2) close\n system call, as demonstrated by an attack against seccomp before 3.16\n (bnc#926240).\n- CVE-2015-0777: drivers/xen/usbback/usbback.c in the Linux kernel\n allowed guest OS users to obtain sensitive information from uninitialized\n locations in host OS kernel memory via unspecified vectors (bnc#917830).\n- CVE-2015-2150: Xen and the Linux kernel did not properly restrict access\n to PCI command registers, which might have allowed local guest users to\n cause a denial of service (non-maskable interrupt and host crash) by\n disabling the (1) memory or (2) I/O decoding for a PCI Express device\n and then accessing the device, which triggers an Unsupported Request\n (UR) response (bnc#919463).\n- CVE-2015-5364: A remote denial of service (hang) via UDP flood with\n incorrect package checksums was fixed. (bsc#936831).\n- CVE-2015-5366: A remote denial of service (unexpected error returns)\n via UDP flood with incorrect package checksums was fixed. (bsc#936831).\n- CVE-2015-1420: CVE-2015-1420: Race condition in the handle_to_path\n function in fs/fhandle.c in the Linux kernel allowed local users to bypass\n intended size restrictions and trigger read operations on additional\n memory locations by changing the handle_bytes value of a file handle\n during the execution of this function (bnc#915517).\n- CVE-2015-4700: A local user could have created a bad instruction in\n the JIT processed BPF code, leading to a kernel crash (bnc#935705).\n- CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in\n fs/pipe.c in the Linux kernel did not properly consider the side effects\n of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls,\n which allowed local users to cause a denial of service (system crash)\n or possibly gain privileges via a crafted application, aka an \u0027I/O vector\n array overrun\u0027 (bnc#933429).\n- CVE-2015-3331: The __driver_rfc4106_decrypt function in\n arch/x86/crypto/aesni-intel_glue.c in the Linux kernel did not properly\n determine the memory locations used for encrypted data, which allowed\n context-dependent attackers to cause a denial of service (buffer overflow\n and system crash) or possibly execute arbitrary code by triggering a\n crypto API call, as demonstrated by use of a libkcapi test program with\n an AF_ALG(aead) socket (bnc#927257).\n- CVE-2015-2922: The ndisc_router_discovery function in net/ipv6/ndisc.c\n in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack\n in the Linux kernel allowed remote attackers to reconfigure a hop-limit\n setting via a small hop_limit value in a Router Advertisement (RA)\n message (bnc#922583).\n- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel used an\n incorrect data type in a sysctl table, which allowed local users to\n obtain potentially sensitive information from kernel memory or possibly\n have unspecified other impact by accessing a sysctl entry (bnc#919007).\n- CVE-2015-3636: The ping_unhash function in net/ipv4/ping.c in the\n Linux kernel did not initialize a certain list data structure during an\n unhash operation, which allowed local users to gain privileges or cause\n a denial of service (use-after-free and system crash) by leveraging the\n ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or\n IPPROTO_ICMPV6 protocol, and then making a connect system call after a\n disconnect (bnc#929525).\n- CVE-2014-8086: Race condition in the ext4_file_write_iter function\n in fs/ext4/file.c in the Linux kernel allowed local users to cause a\n denial of service (file unavailability) via a combination of a write\n action and an F_SETFL fcntl operation for the O_DIRECT flag (bnc#900881).\n- CVE-2014-8159: The InfiniBand (IB) implementation in the Linux kernel\n did not properly restrict use of User Verbs for registration of memory\n regions, which allowed local users to access arbitrary physical memory\n locations, and consequently cause a denial of service (system crash)\n or gain privileges, by leveraging permissions on a uverbs device under\n /dev/infiniband/ (bnc#914742).\n- CVE-2014-9683: Off-by-one error in the ecryptfs_decode_from_filename\n function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux\n kernel allowed local users to cause a denial of service (buffer overflow\n and system crash) or possibly gain privileges via a crafted filename\n (bnc#918333).\n- CVE-2015-2042: net/rds/sysctl.c in the Linux kernel used an incorrect\n data type in a sysctl table, which allowed local users to obtain\n potentially sensitive information from kernel memory or possibly have\n unspecified other impact by accessing a sysctl entry (bnc#919018).\n- CVE-2015-1421: Use-after-free vulnerability in the sctp_assoc_update\n function in net/sctp/associola.c in the Linux kernel allowed remote\n attackers to cause a denial of service (slab corruption and panic) or\n possibly have unspecified other impact by triggering an INIT collision\n that leads to improper handling of shared-key data (bnc#915577).\n\nThe following non-security bugs were fixed:\n- HID: add ALWAYS_POLL quirk for a Logitech 0xc007 (bnc#931474).\n- HID: add HP OEM mouse to quirk ALWAYS_POLL (bnc#931474).\n- HID: add quirk for PIXART OEM mouse used by HP (bnc#931474).\n- HID: usbhid: add always-poll quirk (bnc#931474).\n- HID: usbhid: add another mouse that needs QUIRK_ALWAYS_POLL (bnc#931474).\n- HID: usbhid: enable always-poll quirk for Elan Touchscreen 009b (bnc#931474).\n- HID: usbhid: enable always-poll quirk for Elan Touchscreen 0103 (bnc#931474).\n- HID: usbhid: enable always-poll quirk for Elan Touchscreen 016f (bnc#931474).\n- HID: usbhid: enable always-poll quirk for Elan Touchscreen.\n- HID: usbhid: fix PIXART optical mouse (bnc#931474).\n- HID: usbhid: more mice with ALWAYS_POLL (bnc#931474).\n- HID: usbhid: yet another mouse with ALWAYS_POLL (bnc#931474).\n- bnx2x: Fix kdump when iommu=on (bug#921769).\n- cifs: fix use-after-free bug in find_writable_file (bnc#909477).\n- coredump: ensure the fpu state is flushed for proper multi-threaded core dump (bsc#904671, bsc#929360).\n- dm: fixed that LVM merge snapshot of root logical volume were not working (bsc#928801)\n- deal with deadlock in d_walk fix (bnc#929148, bnc#929283).\n- e1000: do not enable dma receives until after dma address has been setup (bsc#821931).\n- fsnotify: Fix handling of renames in audit (bnc#915200).\n- inet: add a redirect generation id in inetpeer (bnc#860593).\n- inetpeer: initialize -\u0026gt;redirect_genid in inet_getpeer() (bnc#860593).\n- kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593).\n- kernel: fix data corruption when reading /proc/sysinfo (bsc#891087, bsc#937986, LTC#114480).\n- libata: prevent HSM state change race between ISR and PIO (bsc#923245).\n- time, ntp: Do not update time_state in middle of leap second (bsc#912916).\n- s390-3215-tty-close-crash.patch: kernel: 3215 tty close crash (bsc#916010, LTC#120873).\n- s390-3215-tty-close-race.patch: kernel: 3215 console crash (bsc#916010, LTC#94302).\n- s390-3215-tty-hang.patch: Renamed from patches.arch/s390-tty-hang.patch.\n- s390-3215-tty-hang.patch: Update references (bnc#898693, bnc#897995, LTC#114562).\n- s390-dasd-retry-partition-detection.patch: s390/dasd: retry partition detection (bsc#916010, LTC#94302).\n- s390-dasd-retry-partition-detection.patch: Update references (bsc#916010, LTC#120565).\n- s390-sclp-tty-refcount.patch: kernel: sclp console tty reference counting (bsc#916010, LTC#115466).\n- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).\n- scsi/sg: sg_start_req(): make sure that there is not too many elements in iovec (bsc#940338).\n- x86, xsave: remove thread_has_fpu() bug check in __sanitize_i387_state() (bsc#904671, bsc#929360).\n- x86-mm-send-tlb-flush-ipis-to-online-cpus-only.patch: x86, mm: Send tlb flush IPIs to online cpus only (bnc#798406).\n- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).\n- x86/reboot: Fix a warning message triggered by stop_other_cpus() (bnc#930284).\n- xen: Correctly re-enable interrupts in xen_spin_wait() (bsc#879878, bsc#908870).\n- xfs: prevent deadlock trying to cover an active log (bsc#917093).\n ", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-kernel-20150819-12065", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1478-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1478-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151478-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1478-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" }, { "category": "self", "summary": "SUSE Bug 798406", "url": "https://bugzilla.suse.com/798406" }, { "category": "self", "summary": "SUSE Bug 821931", "url": "https://bugzilla.suse.com/821931" }, { "category": "self", "summary": "SUSE Bug 860593", "url": "https://bugzilla.suse.com/860593" }, { "category": "self", "summary": "SUSE Bug 879878", "url": "https://bugzilla.suse.com/879878" }, { "category": "self", "summary": "SUSE Bug 891087", "url": "https://bugzilla.suse.com/891087" }, { "category": "self", "summary": "SUSE Bug 897995", "url": "https://bugzilla.suse.com/897995" }, { "category": "self", "summary": "SUSE Bug 898693", "url": "https://bugzilla.suse.com/898693" }, { "category": "self", "summary": "SUSE Bug 900881", "url": "https://bugzilla.suse.com/900881" }, { "category": "self", "summary": "SUSE Bug 904671", "url": "https://bugzilla.suse.com/904671" }, { "category": "self", "summary": "SUSE Bug 908870", "url": "https://bugzilla.suse.com/908870" }, { "category": "self", "summary": "SUSE Bug 909477", "url": "https://bugzilla.suse.com/909477" }, { "category": "self", "summary": "SUSE Bug 912916", "url": "https://bugzilla.suse.com/912916" }, { "category": "self", "summary": "SUSE Bug 914742", "url": "https://bugzilla.suse.com/914742" }, { "category": "self", "summary": "SUSE Bug 915200", "url": "https://bugzilla.suse.com/915200" }, { "category": "self", "summary": "SUSE Bug 915517", "url": "https://bugzilla.suse.com/915517" }, { "category": "self", "summary": "SUSE Bug 915577", "url": "https://bugzilla.suse.com/915577" }, { "category": "self", "summary": "SUSE Bug 916010", "url": "https://bugzilla.suse.com/916010" }, { "category": "self", "summary": "SUSE Bug 917093", "url": "https://bugzilla.suse.com/917093" }, { "category": "self", "summary": "SUSE Bug 917830", "url": "https://bugzilla.suse.com/917830" }, { "category": "self", "summary": "SUSE Bug 918333", "url": "https://bugzilla.suse.com/918333" }, { "category": "self", "summary": "SUSE Bug 919007", "url": "https://bugzilla.suse.com/919007" }, { "category": "self", "summary": "SUSE Bug 919018", "url": "https://bugzilla.suse.com/919018" }, { "category": "self", "summary": "SUSE Bug 919463", "url": "https://bugzilla.suse.com/919463" }, { "category": "self", "summary": "SUSE Bug 921769", "url": "https://bugzilla.suse.com/921769" }, { "category": "self", "summary": "SUSE Bug 922583", "url": "https://bugzilla.suse.com/922583" }, { "category": "self", "summary": "SUSE Bug 923245", "url": "https://bugzilla.suse.com/923245" }, { "category": "self", "summary": "SUSE Bug 926240", "url": "https://bugzilla.suse.com/926240" }, { "category": "self", "summary": "SUSE Bug 927257", "url": "https://bugzilla.suse.com/927257" }, { "category": "self", "summary": "SUSE Bug 928801", "url": "https://bugzilla.suse.com/928801" }, { "category": "self", "summary": "SUSE Bug 929148", "url": "https://bugzilla.suse.com/929148" }, { "category": "self", "summary": "SUSE Bug 929283", "url": "https://bugzilla.suse.com/929283" }, { "category": "self", "summary": "SUSE Bug 929360", "url": "https://bugzilla.suse.com/929360" }, { "category": "self", "summary": "SUSE Bug 929525", "url": "https://bugzilla.suse.com/929525" }, { "category": "self", "summary": "SUSE Bug 930284", "url": "https://bugzilla.suse.com/930284" }, { "category": "self", "summary": "SUSE Bug 930934", "url": "https://bugzilla.suse.com/930934" }, { "category": "self", "summary": "SUSE Bug 931474", "url": "https://bugzilla.suse.com/931474" }, { "category": "self", "summary": "SUSE Bug 933429", "url": "https://bugzilla.suse.com/933429" }, { "category": "self", "summary": "SUSE Bug 935705", "url": "https://bugzilla.suse.com/935705" }, { "category": "self", "summary": "SUSE Bug 936831", "url": "https://bugzilla.suse.com/936831" }, { "category": "self", "summary": "SUSE Bug 937032", "url": "https://bugzilla.suse.com/937032" }, { "category": "self", "summary": "SUSE Bug 937986", "url": "https://bugzilla.suse.com/937986" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940398", "url": "https://bugzilla.suse.com/940398" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8086 page", "url": "https://www.suse.com/security/cve/CVE-2014-8086/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8159 page", "url": "https://www.suse.com/security/cve/CVE-2014-8159/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9683 page", "url": "https://www.suse.com/security/cve/CVE-2014-9683/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0777 page", "url": "https://www.suse.com/security/cve/CVE-2015-0777/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1420 page", "url": "https://www.suse.com/security/cve/CVE-2015-1420/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1421 page", "url": "https://www.suse.com/security/cve/CVE-2015-1421/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1805 page", "url": "https://www.suse.com/security/cve/CVE-2015-1805/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2041 page", "url": "https://www.suse.com/security/cve/CVE-2015-2041/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2042 page", "url": "https://www.suse.com/security/cve/CVE-2015-2042/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2150 page", "url": "https://www.suse.com/security/cve/CVE-2015-2150/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2830 page", "url": "https://www.suse.com/security/cve/CVE-2015-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2922 page", "url": "https://www.suse.com/security/cve/CVE-2015-2922/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3331 page", "url": "https://www.suse.com/security/cve/CVE-2015-3331/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3636 page", "url": "https://www.suse.com/security/cve/CVE-2015-3636/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4700 page", "url": "https://www.suse.com/security/cve/CVE-2015-4700/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5364 page", "url": "https://www.suse.com/security/cve/CVE-2015-5364/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5366 page", "url": "https://www.suse.com/security/cve/CVE-2015-5366/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-08-20T15:22:44Z", "generator": { "date": "2015-08-20T15:22:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1478-1", "initial_release_date": "2015-08-20T15:22:44Z", "revision_history": [ { "date": "2015-08-20T15:22:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-default-3.0.101-0.7.37.1.i586", "product_id": "kernel-default-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.7.37.1.i586", "product_id": "kernel-default-base-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.7.37.1.i586", "product_id": "kernel-default-devel-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.7.37.1.i586", "product_id": "kernel-ec2-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.7.37.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.37.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-pae-3.0.101-0.7.37.1.i586", "product_id": "kernel-pae-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.7.37.1.i586", "product_id": "kernel-pae-base-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.7.37.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-source-3.0.101-0.7.37.1.i586", "product_id": "kernel-source-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-syms-3.0.101-0.7.37.1.i586", "product_id": "kernel-syms-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-trace-3.0.101-0.7.37.1.i586", "product_id": "kernel-trace-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.7.37.1.i586", "product_id": "kernel-trace-base-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.7.37.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-xen-3.0.101-0.7.37.1.i586", "product_id": "kernel-xen-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.7.37.1.i586", "product_id": "kernel-xen-base-3.0.101-0.7.37.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.37.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.7.37.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.7.37.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.37.1.s390x", "product": { "name": "kernel-default-3.0.101-0.7.37.1.s390x", "product_id": "kernel-default-3.0.101-0.7.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.37.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.7.37.1.s390x", "product_id": "kernel-default-base-3.0.101-0.7.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.37.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.7.37.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.7.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.7.37.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.7.37.1.s390x", "product_id": "kernel-default-man-3.0.101-0.7.37.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.37.1.s390x", "product": { "name": "kernel-source-3.0.101-0.7.37.1.s390x", "product_id": "kernel-source-3.0.101-0.7.37.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.37.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.7.37.1.s390x", "product_id": "kernel-syms-3.0.101-0.7.37.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.37.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.7.37.1.s390x", "product_id": "kernel-trace-3.0.101-0.7.37.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.37.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.7.37.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.7.37.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.37.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.7.37.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.7.37.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-default-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-source-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-syms-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-trace-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-xen-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.7.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.37.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.7.37.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.7.37.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-default-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.37.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.7.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.37.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.7.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.37.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.7.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.7.37.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.7.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-source-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.37.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.7.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.37.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.7.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.37.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.7.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.37.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.7.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.37.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.37.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-8086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8086" } ], "notes": [ { "category": "general", "text": "Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8086", "url": "https://www.suse.com/security/cve/CVE-2014-8086" }, { "category": "external", "summary": "SUSE Bug 900881 for CVE-2014-8086", "url": "https://bugzilla.suse.com/900881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2014-8086" }, { "cve": "CVE-2014-8159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8159" } ], "notes": [ { "category": "general", "text": "The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8159", "url": "https://www.suse.com/security/cve/CVE-2014-8159" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2014-8159", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 914742 for CVE-2014-8159", "url": "https://bugzilla.suse.com/914742" }, { "category": "external", "summary": "SUSE Bug 939241 for CVE-2014-8159", "url": "https://bugzilla.suse.com/939241" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2014-8159" }, { "cve": "CVE-2014-9683", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9683" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9683", "url": "https://www.suse.com/security/cve/CVE-2014-9683" }, { "category": "external", "summary": "SUSE Bug 918333 for CVE-2014-9683", "url": "https://bugzilla.suse.com/918333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "low" } ], "title": "CVE-2014-9683" }, { "cve": "CVE-2015-0777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0777" } ], "notes": [ { "category": "general", "text": "drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0777", "url": "https://www.suse.com/security/cve/CVE-2015-0777" }, { "category": "external", "summary": "SUSE Bug 917830 for CVE-2015-0777", "url": "https://bugzilla.suse.com/917830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "low" } ], "title": "CVE-2015-0777" }, { "cve": "CVE-2015-1420", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1420" } ], "notes": [ { "category": "general", "text": "Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1420", "url": "https://www.suse.com/security/cve/CVE-2015-1420" }, { "category": "external", "summary": "SUSE Bug 915517 for CVE-2015-1420", "url": "https://bugzilla.suse.com/915517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-1420" }, { "cve": "CVE-2015-1421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1421" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1421", "url": "https://www.suse.com/security/cve/CVE-2015-1421" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-1421", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 915577 for CVE-2015-1421", "url": "https://bugzilla.suse.com/915577" }, { "category": "external", "summary": "SUSE Bug 922004 for CVE-2015-1421", "url": "https://bugzilla.suse.com/922004" }, { "category": "external", "summary": "SUSE Bug 939261 for CVE-2015-1421", "url": "https://bugzilla.suse.com/939261" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-1421" }, { "cve": "CVE-2015-1805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1805" } ], "notes": [ { "category": "general", "text": "The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an \"I/O vector array overrun.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1805", "url": "https://www.suse.com/security/cve/CVE-2015-1805" }, { "category": "external", "summary": "SUSE Bug 917839 for CVE-2015-1805", "url": "https://bugzilla.suse.com/917839" }, { "category": "external", "summary": "SUSE Bug 933429 for CVE-2015-1805", "url": "https://bugzilla.suse.com/933429" }, { "category": "external", "summary": "SUSE Bug 939270 for CVE-2015-1805", "url": "https://bugzilla.suse.com/939270" }, { "category": "external", "summary": "SUSE Bug 964730 for CVE-2015-1805", "url": "https://bugzilla.suse.com/964730" }, { "category": "external", "summary": "SUSE Bug 964732 for CVE-2015-1805", "url": "https://bugzilla.suse.com/964732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "important" } ], "title": "CVE-2015-1805" }, { "cve": "CVE-2015-2041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2041" } ], "notes": [ { "category": "general", "text": "net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2041", "url": "https://www.suse.com/security/cve/CVE-2015-2041" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2041", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 919007 for CVE-2015-2041", "url": "https://bugzilla.suse.com/919007" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-2041" }, { "cve": "CVE-2015-2042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2042" } ], "notes": [ { "category": "general", "text": "net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2042", "url": "https://www.suse.com/security/cve/CVE-2015-2042" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2042", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 919018 for CVE-2015-2042", "url": "https://bugzilla.suse.com/919018" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-2042" }, { "cve": "CVE-2015-2150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2150" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2150", "url": "https://www.suse.com/security/cve/CVE-2015-2150" }, { "category": "external", "summary": "SUSE Bug 800280 for CVE-2015-2150", "url": "https://bugzilla.suse.com/800280" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2150", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 919463 for CVE-2015-2150", "url": "https://bugzilla.suse.com/919463" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-2150" }, { "cve": "CVE-2015-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2830" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2830", "url": "https://www.suse.com/security/cve/CVE-2015-2830" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2830", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 926240 for CVE-2015-2830", "url": "https://bugzilla.suse.com/926240" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-2830" }, { "cve": "CVE-2015-2922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2922" } ], "notes": [ { "category": "general", "text": "The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2922", "url": "https://www.suse.com/security/cve/CVE-2015-2922" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2922", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 922583 for CVE-2015-2922", "url": "https://bugzilla.suse.com/922583" }, { "category": "external", "summary": "SUSE Bug 926223 for CVE-2015-2922", "url": "https://bugzilla.suse.com/926223" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-2922" }, { "cve": "CVE-2015-3331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3331" } ], "notes": [ { "category": "general", "text": "The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3331", "url": "https://www.suse.com/security/cve/CVE-2015-3331" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-3331", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 927257 for CVE-2015-3331", "url": "https://bugzilla.suse.com/927257" }, { "category": "external", "summary": "SUSE Bug 931231 for CVE-2015-3331", "url": "https://bugzilla.suse.com/931231" }, { "category": "external", "summary": "SUSE Bug 939262 for CVE-2015-3331", "url": "https://bugzilla.suse.com/939262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "critical" } ], "title": "CVE-2015-3331" }, { "cve": "CVE-2015-3636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3636" } ], "notes": [ { "category": "general", "text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3636", "url": "https://www.suse.com/security/cve/CVE-2015-3636" }, { "category": "external", "summary": "SUSE Bug 929525 for CVE-2015-3636", "url": "https://bugzilla.suse.com/929525" }, { "category": "external", "summary": "SUSE Bug 939277 for CVE-2015-3636", "url": "https://bugzilla.suse.com/939277" }, { "category": "external", "summary": "SUSE Bug 994624 for CVE-2015-3636", "url": "https://bugzilla.suse.com/994624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-3636" }, { "cve": "CVE-2015-4700", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4700" } ], "notes": [ { "category": "general", "text": "The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4700", "url": "https://www.suse.com/security/cve/CVE-2015-4700" }, { "category": "external", "summary": "SUSE Bug 935705 for CVE-2015-4700", "url": "https://bugzilla.suse.com/935705" }, { "category": "external", "summary": "SUSE Bug 939273 for CVE-2015-4700", "url": "https://bugzilla.suse.com/939273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-4700" }, { "cve": "CVE-2015-5364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5364" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5364", "url": "https://www.suse.com/security/cve/CVE-2015-5364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5364", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5364", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5364", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5364", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5364", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-5364" }, { "cve": "CVE-2015-5366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5366" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5366", "url": "https://www.suse.com/security/cve/CVE-2015-5366" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5366", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5366", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5366", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5366", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-5366" }, { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.37.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-20T15:22:44Z", "details": "moderate" } ], "title": "CVE-2015-5707" } ] }
suse-su-2015:1611-1
Vulnerability from csaf_suse
Published
2015-08-21 19:44
Modified
2015-08-21 19:44
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-5707: An integer overflow in the SCSI generic driver could
be potentially used by local attackers to crash the kernel or execute
code (bsc#940338).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: A race condition in the handle_to_path function in
fs/fhandle.c in the Linux kernel allowed local users to bypass intended
size restrictions and trigger read operations on additional memory
locations by changing the handle_bytes value of a file handle during
the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-4167: The UDF filesystem in the Linux kernel was vulnerable
to a crash which could occur while fetching inode information from a
corrupted/malicious udf file system image. (bsc#933907).
- CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731: Various
issues in handling UDF filesystems in the Linux kernel allowed the
corruption of kernel memory and other issues. An attacker able to mount
a corrupted/malicious UDF file system image could cause the kernel to
crash. (bsc#933904 bsc#933896)
- CVE-2015-2150: The Linux kernel did not properly restrict access to
PCI command registers, which might have allowed local guest users to
cause a denial of service (non-maskable interrupt and host crash) by
disabling the (1) memory or (2) I/O decoding for a PCI Express device
and then accessing the device, which triggers an Unsupported Request
(UR) response (bsc#919463).
- CVE-2015-0777: drivers/xen/usbback/usbback.c as used in the Linux
kernel 2.6.x and 3.x in SUSE Linux distributions, allowed guest OS users
to obtain sensitive information from uninitialized locations in host OS
kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
not prevent the TS_COMPAT flag from reaching a user-mode task, which
might have allowed local users to bypass the seccomp or audit protection
mechanism via a crafted application that uses the (1) fork or (2) close
system call, as demonstrated by an attack against seccomp before 3.16
(bnc#926240).
- CVE-2015-1805: The Linux kernels implementation of vectored pipe
read and write functionality did not take into account the I/O vectors
that were already processed when retrying after a failed atomic access
operation, potentially resulting in memory corruption due to an I/O vector
array overrun. A local, unprivileged user could use this flaw to crash
the system or, potentially, escalate their privileges on the system.
(bsc#933429).
Also the following non-security bugs were fixed:
- audit: keep inode pinned (bsc#851068).
- btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350).
- btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- cifs: Fix missing crypto allocation (bnc#937402).
- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).
- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails.
- ext3: Fix data corruption in inodes with journalled data (bsc#936637)
- ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm->pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipr: Increase default adapter init stage change timeout (bsc#930761).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn. (bsc#934742)
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- nfsd: Fix nfsv4 opcode decoding error (bsc#935906).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- nfs: never queue requests with rq_cong set on the sending queue (bsc#932458).
- nfsv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Disable Bus Master only on kexec reboot (bsc#920110).
- pci: disable Bus Master on PCI device shutdown (bsc#920110).
- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- pci: Don't try to disable Bus Master on disconnected PCI devices (bsc#920110).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: set host msg status correctly (bnc#933936)
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: avoid mounting of xfs filesystems with inconsistent option (bnc#925705)
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925, LTC#126491).
Patchnames
sledsp3-kernel-201508-12100,slessp3-kernel-201508-12100,slexsp3-kernel-201508-12100
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n\n- CVE-2015-5707: An integer overflow in the SCSI generic driver could\n be potentially used by local attackers to crash the kernel or execute\n code (bsc#940338).\n- CVE-2015-5364: A remote denial of service (hang) via UDP flood with\n incorrect package checksums was fixed. (bsc#936831).\n- CVE-2015-5366: A remote denial of service (unexpected error returns)\n via UDP flood with incorrect package checksums was fixed. (bsc#936831).\n- CVE-2015-1420: A race condition in the handle_to_path function in\n fs/fhandle.c in the Linux kernel allowed local users to bypass intended\n size restrictions and trigger read operations on additional memory\n locations by changing the handle_bytes value of a file handle during\n the execution of this function (bnc#915517).\n- CVE-2015-4700: A local user could have created a bad instruction in\n the JIT processed BPF code, leading to a kernel crash (bnc#935705).\n- CVE-2015-4167: The UDF filesystem in the Linux kernel was vulnerable\n to a crash which could occur while fetching inode information from a\n corrupted/malicious udf file system image. (bsc#933907).\n- CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731: Various\n issues in handling UDF filesystems in the Linux kernel allowed the\n corruption of kernel memory and other issues. An attacker able to mount\n a corrupted/malicious UDF file system image could cause the kernel to\n crash. (bsc#933904 bsc#933896)\n- CVE-2015-2150: The Linux kernel did not properly restrict access to\n PCI command registers, which might have allowed local guest users to\n cause a denial of service (non-maskable interrupt and host crash) by\n disabling the (1) memory or (2) I/O decoding for a PCI Express device\n and then accessing the device, which triggers an Unsupported Request\n (UR) response (bsc#919463).\n- CVE-2015-0777: drivers/xen/usbback/usbback.c as used in the Linux\n kernel 2.6.x and 3.x in SUSE Linux distributions, allowed guest OS users\n to obtain sensitive information from uninitialized locations in host OS\n kernel memory via unspecified vectors (bnc#917830).\n- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did\n not prevent the TS_COMPAT flag from reaching a user-mode task, which\n might have allowed local users to bypass the seccomp or audit protection\n mechanism via a crafted application that uses the (1) fork or (2) close\n system call, as demonstrated by an attack against seccomp before 3.16\n (bnc#926240).\n- CVE-2015-1805: The Linux kernels implementation of vectored pipe\n read and write functionality did not take into account the I/O vectors\n that were already processed when retrying after a failed atomic access\n operation, potentially resulting in memory corruption due to an I/O vector\n array overrun. A local, unprivileged user could use this flaw to crash\n the system or, potentially, escalate their privileges on the system.\n (bsc#933429).\n\n\nAlso the following non-security bugs were fixed:\n- audit: keep inode pinned (bsc#851068).\n- btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350).\n- btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).\n- btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).\n- cifs: Fix missing crypto allocation (bnc#937402).\n- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).\n- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).\n- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).\n- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).\n- drm/mgag200: Do not do full cleanup if mgag200_device_init fails.\n- ext3: Fix data corruption in inodes with journalled data (bsc#936637)\n- ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).\n- fanotify: Fix deadlock with permission events (bsc#935053).\n- fork: reset mm-\u003epinned_vm (bnc#937855).\n- hrtimer: prevent timer interrupt DoS (bnc#886785).\n- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).\n- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).\n- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).\n- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).\n- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).\n- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).\n- ipr: Increase default adapter init stage change timeout (bsc#930761).\n- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).\n- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).\n- kernel: add panic_on_warn. (bsc#934742)\n- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).\n- libata: prevent HSM state change race between ISR and PIO (bsc#923245).\n- md: use kzalloc() when bitmap is disabled (bsc#939994).\n- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).\n- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).\n- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).\n- mm: restrict access to slab files under procfs and sysfs (bnc#936077).\n- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).\n- net: Fix \u0027ip rule delete table 256\u0027 (bsc#873385).\n- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).\n- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).\n- nfsd: Fix nfsv4 opcode decoding error (bsc#935906).\n- nfsd: support disabling 64bit dir cookies (bnc#937503).\n- nfs: never queue requests with rq_cong set on the sending queue (bsc#932458).\n- nfsv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).\n- pagecache limit: add tracepoints (bnc#924701).\n- pagecache limit: Do not skip over small zones that easily (bnc#925881).\n- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).\n- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).\n- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).\n- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).\n- pci: Disable Bus Master only on kexec reboot (bsc#920110).\n- pci: disable Bus Master on PCI device shutdown (bsc#920110).\n- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).\n- pci: Don\u0027t try to disable Bus Master on disconnected PCI devices (bsc#920110).\n- perf, nmi: Fix unknown NMI warning (bsc#929142).\n- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).\n- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).\n- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)\n- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).\n- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).\n- scsi: set host msg status correctly (bnc#933936)\n- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).\n- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).\n- udf: Remove repeated loads blocksize (bsc#933907).\n- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).\n- vmxnet3: Bump up driver version number (bsc#936423).\n- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).\n- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).\n- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).\n- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).\n- x86, tls: Interpret an all-zero struct user_desc as \u0027no segment\u0027 (bsc#920250).\n- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).\n- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.\n- xfs: avoid mounting of xfs filesystems with inconsistent option (bnc#925705)\n- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925, LTC#126491).\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-kernel-201508-12100,slessp3-kernel-201508-12100,slexsp3-kernel-201508-12100", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1611-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1611-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151611-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1611-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" }, { "category": "self", "summary": "SUSE Bug 851068", "url": "https://bugzilla.suse.com/851068" }, { "category": "self", "summary": "SUSE Bug 867362", "url": "https://bugzilla.suse.com/867362" }, { "category": "self", "summary": "SUSE Bug 873385", "url": "https://bugzilla.suse.com/873385" }, { "category": "self", "summary": "SUSE Bug 883380", "url": "https://bugzilla.suse.com/883380" }, { "category": "self", "summary": "SUSE Bug 886785", "url": "https://bugzilla.suse.com/886785" }, { "category": "self", "summary": "SUSE Bug 894936", "url": "https://bugzilla.suse.com/894936" }, { "category": "self", "summary": "SUSE Bug 915517", "url": "https://bugzilla.suse.com/915517" }, { "category": "self", "summary": "SUSE Bug 917830", "url": "https://bugzilla.suse.com/917830" }, { "category": "self", "summary": "SUSE Bug 919463", "url": "https://bugzilla.suse.com/919463" }, { "category": "self", "summary": "SUSE Bug 920110", "url": "https://bugzilla.suse.com/920110" }, { "category": "self", "summary": "SUSE Bug 920250", "url": "https://bugzilla.suse.com/920250" }, { "category": "self", "summary": "SUSE Bug 920733", "url": "https://bugzilla.suse.com/920733" }, { "category": "self", "summary": "SUSE Bug 921430", "url": "https://bugzilla.suse.com/921430" }, { "category": "self", "summary": "SUSE Bug 923245", "url": "https://bugzilla.suse.com/923245" }, { "category": "self", "summary": "SUSE Bug 924701", "url": "https://bugzilla.suse.com/924701" }, { "category": "self", "summary": "SUSE Bug 925705", "url": "https://bugzilla.suse.com/925705" }, { "category": "self", "summary": "SUSE Bug 925881", "url": "https://bugzilla.suse.com/925881" }, { "category": "self", "summary": "SUSE Bug 925903", "url": "https://bugzilla.suse.com/925903" }, { "category": "self", "summary": "SUSE Bug 926240", "url": "https://bugzilla.suse.com/926240" }, { "category": "self", "summary": "SUSE Bug 926953", "url": "https://bugzilla.suse.com/926953" }, { "category": "self", "summary": "SUSE Bug 927355", "url": "https://bugzilla.suse.com/927355" }, { "category": "self", "summary": "SUSE Bug 927786", "url": "https://bugzilla.suse.com/927786" }, { "category": "self", "summary": "SUSE Bug 929142", "url": "https://bugzilla.suse.com/929142" }, { "category": "self", "summary": "SUSE Bug 929143", "url": "https://bugzilla.suse.com/929143" }, { "category": "self", "summary": "SUSE Bug 930092", "url": "https://bugzilla.suse.com/930092" }, { "category": "self", "summary": "SUSE Bug 930761", "url": "https://bugzilla.suse.com/930761" }, { "category": "self", "summary": "SUSE Bug 930934", "url": "https://bugzilla.suse.com/930934" }, { "category": "self", "summary": "SUSE Bug 931538", "url": "https://bugzilla.suse.com/931538" }, { "category": "self", "summary": "SUSE Bug 932348", "url": "https://bugzilla.suse.com/932348" }, { "category": "self", "summary": "SUSE Bug 932458", "url": "https://bugzilla.suse.com/932458" }, { "category": "self", "summary": "SUSE Bug 933429", "url": "https://bugzilla.suse.com/933429" }, { "category": "self", "summary": "SUSE Bug 933896", "url": "https://bugzilla.suse.com/933896" }, { "category": "self", "summary": "SUSE Bug 933904", "url": "https://bugzilla.suse.com/933904" }, { "category": "self", "summary": "SUSE Bug 933907", "url": "https://bugzilla.suse.com/933907" }, { "category": "self", "summary": "SUSE Bug 933936", "url": "https://bugzilla.suse.com/933936" }, { "category": "self", "summary": "SUSE Bug 934742", "url": "https://bugzilla.suse.com/934742" }, { "category": "self", "summary": "SUSE Bug 934944", "url": "https://bugzilla.suse.com/934944" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935572", "url": "https://bugzilla.suse.com/935572" }, { "category": "self", "summary": "SUSE Bug 935705", "url": "https://bugzilla.suse.com/935705" }, { "category": "self", "summary": "SUSE Bug 935866", "url": "https://bugzilla.suse.com/935866" }, { "category": "self", "summary": "SUSE Bug 935906", "url": "https://bugzilla.suse.com/935906" }, { "category": "self", "summary": "SUSE Bug 936077", "url": "https://bugzilla.suse.com/936077" }, { "category": "self", "summary": "SUSE Bug 936423", "url": "https://bugzilla.suse.com/936423" }, { "category": "self", "summary": "SUSE Bug 936637", "url": "https://bugzilla.suse.com/936637" }, { "category": "self", "summary": "SUSE Bug 936831", "url": "https://bugzilla.suse.com/936831" }, { "category": "self", "summary": "SUSE Bug 936875", "url": "https://bugzilla.suse.com/936875" }, { "category": "self", "summary": "SUSE Bug 936925", "url": "https://bugzilla.suse.com/936925" }, { "category": "self", "summary": "SUSE Bug 937032", "url": "https://bugzilla.suse.com/937032" }, { "category": "self", "summary": "SUSE Bug 937402", "url": "https://bugzilla.suse.com/937402" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 937503", "url": "https://bugzilla.suse.com/937503" }, { "category": "self", "summary": "SUSE Bug 937641", "url": "https://bugzilla.suse.com/937641" }, { "category": "self", "summary": "SUSE Bug 937855", "url": "https://bugzilla.suse.com/937855" }, { "category": "self", "summary": "SUSE Bug 939910", "url": "https://bugzilla.suse.com/939910" }, { "category": "self", "summary": "SUSE Bug 939994", "url": "https://bugzilla.suse.com/939994" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940398", "url": "https://bugzilla.suse.com/940398" }, { "category": "self", "summary": "SUSE Bug 942350", "url": "https://bugzilla.suse.com/942350" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9728 page", "url": "https://www.suse.com/security/cve/CVE-2014-9728/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9729 page", "url": "https://www.suse.com/security/cve/CVE-2014-9729/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9730 page", "url": "https://www.suse.com/security/cve/CVE-2014-9730/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9731 page", "url": "https://www.suse.com/security/cve/CVE-2014-9731/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0777 page", "url": "https://www.suse.com/security/cve/CVE-2015-0777/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1420 page", "url": "https://www.suse.com/security/cve/CVE-2015-1420/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1805 page", "url": "https://www.suse.com/security/cve/CVE-2015-1805/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2150 page", "url": "https://www.suse.com/security/cve/CVE-2015-2150/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2830 page", "url": "https://www.suse.com/security/cve/CVE-2015-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4167 page", "url": "https://www.suse.com/security/cve/CVE-2015-4167/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4700 page", "url": "https://www.suse.com/security/cve/CVE-2015-4700/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5364 page", "url": "https://www.suse.com/security/cve/CVE-2015-5364/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5366 page", "url": "https://www.suse.com/security/cve/CVE-2015-5366/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-08-21T19:44:59Z", "generator": { "date": "2015-08-21T19:44:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1611-1", "initial_release_date": "2015-08-21T19:44:59Z", "revision_history": [ { "date": "2015-08-21T19:44:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-default-3.0.101-0.47.67.2.i586", "product_id": "kernel-default-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.67.2.i586", "product_id": "kernel-default-base-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.67.2.i586", "product_id": "kernel-default-devel-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-default-extra-3.0.101-0.47.67.2.i586", "product_id": "kernel-default-extra-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-pae-3.0.101-0.47.67.2.i586", "product_id": "kernel-pae-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.67.2.i586", "product_id": "kernel-pae-base-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.67.2.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-pae-extra-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-pae-extra-3.0.101-0.47.67.2.i586", "product_id": "kernel-pae-extra-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-source-3.0.101-0.47.67.2.i586", "product_id": "kernel-source-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-syms-3.0.101-0.47.67.2.i586", "product_id": "kernel-syms-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-xen-3.0.101-0.47.67.2.i586", "product_id": "kernel-xen-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.67.2.i586", "product_id": "kernel-xen-base-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.67.2.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-xen-extra-3.0.101-0.47.67.2.i586", "product_id": "kernel-xen-extra-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.67.2.i586", "product_id": "kernel-ec2-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.67.2.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.67.2.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-trace-3.0.101-0.47.67.2.i586", "product_id": "kernel-trace-3.0.101-0.47.67.2.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.67.2.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.67.2.i586", "product_id": "kernel-trace-base-3.0.101-0.47.67.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.67.2.ia64", "product": { "name": "kernel-default-3.0.101-0.47.67.2.ia64", "product_id": "kernel-default-3.0.101-0.47.67.2.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.67.2.ia64", "product": { "name": "kernel-default-base-3.0.101-0.47.67.2.ia64", "product_id": "kernel-default-base-3.0.101-0.47.67.2.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.67.2.ia64", "product": { "name": "kernel-default-devel-3.0.101-0.47.67.2.ia64", "product_id": "kernel-default-devel-3.0.101-0.47.67.2.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.67.2.ia64", "product": { "name": "kernel-source-3.0.101-0.47.67.2.ia64", "product_id": "kernel-source-3.0.101-0.47.67.2.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.67.2.ia64", "product": { "name": "kernel-syms-3.0.101-0.47.67.2.ia64", "product_id": "kernel-syms-3.0.101-0.47.67.2.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.67.2.ia64", "product": { "name": "kernel-trace-3.0.101-0.47.67.2.ia64", "product_id": "kernel-trace-3.0.101-0.47.67.2.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.67.2.ia64", "product": { "name": "kernel-trace-base-3.0.101-0.47.67.2.ia64", "product_id": "kernel-trace-base-3.0.101-0.47.67.2.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.67.2.ia64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.ia64", "product_id": "kernel-trace-devel-3.0.101-0.47.67.2.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-default-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-default-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-default-base-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-default-base-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-default-devel-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-default-devel-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-ppc64-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-ppc64-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-ppc64-base-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-source-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-source-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-syms-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-syms-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-trace-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-trace-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-trace-base-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-trace-base-3.0.101-0.47.67.2.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "product_id": "kernel-trace-devel-3.0.101-0.47.67.2.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.67.2.s390x", "product": { "name": "kernel-default-3.0.101-0.47.67.2.s390x", "product_id": "kernel-default-3.0.101-0.47.67.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.67.2.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.67.2.s390x", "product_id": "kernel-default-base-3.0.101-0.47.67.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.67.2.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.67.2.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.67.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.67.2.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.67.2.s390x", "product_id": "kernel-default-man-3.0.101-0.47.67.2.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.67.2.s390x", "product": { "name": "kernel-source-3.0.101-0.47.67.2.s390x", "product_id": "kernel-source-3.0.101-0.47.67.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.67.2.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.67.2.s390x", "product_id": "kernel-syms-3.0.101-0.47.67.2.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.67.2.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.67.2.s390x", "product_id": "kernel-trace-3.0.101-0.47.67.2.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.67.2.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.67.2.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.67.2.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.67.2.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.67.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-default-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-default-extra-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-default-extra-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-source-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-syms-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-xen-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-xen-extra-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-trace-3.0.101-0.47.67.2.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.67.2.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.67.2.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.67.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-extra-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-extra-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-extra-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-extra-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-extra-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.67.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.67.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.67.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9728" } ], "notes": [ { "category": "general", "text": "The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9728", "url": "https://www.suse.com/security/cve/CVE-2014-9728" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9728", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933904 for CVE-2014-9728", "url": "https://bugzilla.suse.com/933904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "low" } ], "title": "CVE-2014-9728" }, { "cve": "CVE-2014-9729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9729" } ], "notes": [ { "category": "general", "text": "The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9729", "url": "https://www.suse.com/security/cve/CVE-2014-9729" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9729", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933904 for CVE-2014-9729", "url": "https://bugzilla.suse.com/933904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "low" } ], "title": "CVE-2014-9729" }, { "cve": "CVE-2014-9730", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9730" } ], "notes": [ { "category": "general", "text": "The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9730", "url": "https://www.suse.com/security/cve/CVE-2014-9730" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9730", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933904 for CVE-2014-9730", "url": "https://bugzilla.suse.com/933904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "low" } ], "title": "CVE-2014-9730" }, { "cve": "CVE-2014-9731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9731" } ], "notes": [ { "category": "general", "text": "The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target\u0027s name along with a trailing \\0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9731", "url": "https://www.suse.com/security/cve/CVE-2014-9731" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9731", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933896 for CVE-2014-9731", "url": "https://bugzilla.suse.com/933896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "moderate" } ], "title": "CVE-2014-9731" }, { "cve": "CVE-2015-0777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0777" } ], "notes": [ { "category": "general", "text": "drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0777", "url": "https://www.suse.com/security/cve/CVE-2015-0777" }, { "category": "external", "summary": "SUSE Bug 917830 for CVE-2015-0777", "url": "https://bugzilla.suse.com/917830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "low" } ], "title": "CVE-2015-0777" }, { "cve": "CVE-2015-1420", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1420" } ], "notes": [ { "category": "general", "text": "Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1420", "url": "https://www.suse.com/security/cve/CVE-2015-1420" }, { "category": "external", "summary": "SUSE Bug 915517 for CVE-2015-1420", "url": "https://bugzilla.suse.com/915517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "moderate" } ], "title": "CVE-2015-1420" }, { "cve": "CVE-2015-1805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1805" } ], "notes": [ { "category": "general", "text": "The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an \"I/O vector array overrun.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1805", "url": "https://www.suse.com/security/cve/CVE-2015-1805" }, { "category": "external", "summary": "SUSE Bug 917839 for CVE-2015-1805", "url": "https://bugzilla.suse.com/917839" }, { "category": "external", "summary": "SUSE Bug 933429 for CVE-2015-1805", "url": "https://bugzilla.suse.com/933429" }, { "category": "external", "summary": "SUSE Bug 939270 for CVE-2015-1805", "url": "https://bugzilla.suse.com/939270" }, { "category": "external", "summary": "SUSE Bug 964730 for CVE-2015-1805", "url": "https://bugzilla.suse.com/964730" }, { "category": "external", "summary": "SUSE Bug 964732 for CVE-2015-1805", "url": "https://bugzilla.suse.com/964732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "important" } ], "title": "CVE-2015-1805" }, { "cve": "CVE-2015-2150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2150" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2150", "url": "https://www.suse.com/security/cve/CVE-2015-2150" }, { "category": "external", "summary": "SUSE Bug 800280 for CVE-2015-2150", "url": "https://bugzilla.suse.com/800280" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2150", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 919463 for CVE-2015-2150", "url": "https://bugzilla.suse.com/919463" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "moderate" } ], "title": "CVE-2015-2150" }, { "cve": "CVE-2015-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2830" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2830", "url": "https://www.suse.com/security/cve/CVE-2015-2830" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2830", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 926240 for CVE-2015-2830", "url": "https://bugzilla.suse.com/926240" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "moderate" } ], "title": "CVE-2015-2830" }, { "cve": "CVE-2015-4167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4167" } ], "notes": [ { "category": "general", "text": "The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4167", "url": "https://www.suse.com/security/cve/CVE-2015-4167" }, { "category": "external", "summary": "SUSE Bug 917839 for CVE-2015-4167", "url": "https://bugzilla.suse.com/917839" }, { "category": "external", "summary": "SUSE Bug 933907 for CVE-2015-4167", "url": "https://bugzilla.suse.com/933907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "moderate" } ], "title": "CVE-2015-4167" }, { "cve": "CVE-2015-4700", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4700" } ], "notes": [ { "category": "general", "text": "The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4700", "url": "https://www.suse.com/security/cve/CVE-2015-4700" }, { "category": "external", "summary": "SUSE Bug 935705 for CVE-2015-4700", "url": "https://bugzilla.suse.com/935705" }, { "category": "external", "summary": "SUSE Bug 939273 for CVE-2015-4700", "url": "https://bugzilla.suse.com/939273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "moderate" } ], "title": "CVE-2015-4700" }, { "cve": "CVE-2015-5364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5364" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5364", "url": "https://www.suse.com/security/cve/CVE-2015-5364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5364", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5364", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5364", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5364", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5364", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "moderate" } ], "title": "CVE-2015-5364" }, { "cve": "CVE-2015-5366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5366" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5366", "url": "https://www.suse.com/security/cve/CVE-2015-5366" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5366", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5366", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5366", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5366", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "moderate" } ], "title": "CVE-2015-5366" }, { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.67.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.67.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-21T19:44:59Z", "details": "moderate" } ], "title": "CVE-2015-5707" } ] }
suse-su-2015:2089-1
Vulnerability from csaf_suse
Published
2015-11-24 14:47
Modified
2015-11-24 14:47
Summary
Security update for Linux Kernel Live Patch 1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 1
Description of the patch
This kernel live patch for Linux Kernel 3.12.32-33.1 fixes two security issues:
- CVE-2015-7613: A race condition in the IPC object implementation in
the Linux kernel allowed local users to gain privileges by triggering an
ipc_addid call that leads to uid and gid comparisons against uninitialized
data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)
- CVE-2015-5707: Integer overflow in the sg_start_req function in
drivers/scsi/sg.c in the Linux kernel allowed local users to cause a
denial of service or possibly have unspecified other impact via a large
iov_count value in a write request. (bsc#940342 bsc#940338)
Patchnames
SUSE-SLE-Live-Patching-12-2015-883
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 1", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.32-33.1 fixes two security issues:\n\n- CVE-2015-7613: A race condition in the IPC object implementation in\n the Linux kernel allowed local users to gain privileges by triggering an\n ipc_addid call that leads to uid and gid comparisons against uninitialized\n data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)\n- CVE-2015-5707: Integer overflow in the sg_start_req function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to cause a\n denial of service or possibly have unspecified other impact via a large\n iov_count value in a write request. (bsc#940342 bsc#940338)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2015-883", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2089-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2089-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152089-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2089-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-November/001697.html" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 948536", "url": "https://bugzilla.suse.com/948536" }, { "category": "self", "summary": "SUSE Bug 948701", "url": "https://bugzilla.suse.com/948701" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7613 page", "url": "https://www.suse.com/security/cve/CVE-2015-7613/" } ], "title": "Security update for Linux Kernel Live Patch 1", "tracking": { "current_release_date": "2015-11-24T14:47:01Z", "generator": { "date": "2015-11-24T14:47:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2089-1", "initial_release_date": "2015-11-24T14:47:01Z", "revision_history": [ { "date": "2015-11-24T14:47:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_32-33-default-4-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_32-33-default-4-2.3.x86_64", "product_id": "kgraft-patch-3_12_32-33-default-4-2.3.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_32-33-xen-4-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_32-33-xen-4-2.3.x86_64", "product_id": "kgraft-patch-3_12_32-33-xen-4-2.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_32-33-default-4-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-4-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_32-33-default-4-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_32-33-xen-4-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-4-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_32-33-xen-4-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-4-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-4-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:47:01Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-7613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7613" } ], "notes": [ { "category": "general", "text": "Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-4-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7613", "url": "https://www.suse.com/security/cve/CVE-2015-7613" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-7613", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 948536 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948536" }, { "category": "external", "summary": "SUSE Bug 948701 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948701" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-7613", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-4-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-4-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:47:01Z", "details": "important" } ], "title": "CVE-2015-7613" } ] }
suse-su-2015:2091-1
Vulnerability from csaf_suse
Published
2015-11-24 14:47
Modified
2015-11-24 14:47
Summary
Security update for Linux Kernel Live Patch 2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 2
Description of the patch
This kernel live patch for Linux Kernel 3.12.36-38.1 fixes two security issues:
- CVE-2015-7613: A race condition in the IPC object implementation in
the Linux kernel allowed local users to gain privileges by triggering an
ipc_addid call that leads to uid and gid comparisons against uninitialized
data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)
- CVE-2015-5707: Integer overflow in the sg_start_req function in
drivers/scsi/sg.c in the Linux kernel allowed local users to cause a
denial of service or possibly have unspecified other impact via a large
iov_count value in a write request. (bsc#940342 bsc#940338)
Patchnames
SUSE-SLE-Live-Patching-12-2015-884
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 2", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.36-38.1 fixes two security issues:\n\n- CVE-2015-7613: A race condition in the IPC object implementation in\n the Linux kernel allowed local users to gain privileges by triggering an\n ipc_addid call that leads to uid and gid comparisons against uninitialized\n data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)\n- CVE-2015-5707: Integer overflow in the sg_start_req function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to cause a\n denial of service or possibly have unspecified other impact via a large\n iov_count value in a write request. (bsc#940342 bsc#940338)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2015-884", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2091-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2091-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152091-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2091-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-November/001699.html" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 948536", "url": "https://bugzilla.suse.com/948536" }, { "category": "self", "summary": "SUSE Bug 948701", "url": "https://bugzilla.suse.com/948701" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7613 page", "url": "https://www.suse.com/security/cve/CVE-2015-7613/" } ], "title": "Security update for Linux Kernel Live Patch 2", "tracking": { "current_release_date": "2015-11-24T14:47:13Z", "generator": { "date": "2015-11-24T14:47:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2091-1", "initial_release_date": "2015-11-24T14:47:13Z", "revision_history": [ { "date": "2015-11-24T14:47:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_36-38-default-4-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_36-38-default-4-2.3.x86_64", "product_id": "kgraft-patch-3_12_36-38-default-4-2.3.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_36-38-xen-4-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_36-38-xen-4-2.3.x86_64", "product_id": "kgraft-patch-3_12_36-38-xen-4-2.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_36-38-default-4-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-4-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_36-38-default-4-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_36-38-xen-4-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-4-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_36-38-xen-4-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-4-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-4-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:47:13Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-7613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7613" } ], "notes": [ { "category": "general", "text": "Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-4-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7613", "url": "https://www.suse.com/security/cve/CVE-2015-7613" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-7613", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 948536 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948536" }, { "category": "external", "summary": "SUSE Bug 948701 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948701" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-7613", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-4-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-4-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-4-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:47:13Z", "details": "important" } ], "title": "CVE-2015-7613" } ] }
suse-su-2015:1592-1
Vulnerability from csaf_suse
Published
2015-09-09 17:05
Modified
2015-09-09 17:05
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive various security and bugfixes.
The following feature was added for RT:
- FATE#317131: The SocketCAN (Peak PCI) driver was added for CAN bus support.
Following security bugs were fixed:
- CVE-2015-5707: An integer overflow in the SCSI generic driver could
be potentially used by local attackers to crash the kernel or execute
code (bsc#940338).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: A race condition in the handle_to_path function in
fs/fhandle.c in the Linux kernel allowed local users to bypass intended
size restrictions and trigger read operations on additional memory
locations by changing the handle_bytes value of a file handle during
the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-4167: The UDF filesystem in the Linux kernel was vulnerable
to a crash which could occur while fetching inode information from a
corrupted/malicious udf file system image. (bsc#933907).
- CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731: Various
issues in handling UDF filesystems in the Linux kernel allowed the
corruption of kernel memory and other issues. An attacker able to mount
a corrupted/malicious UDF file system image could cause the kernel to
crash. (bsc#933904 bsc#933896)
- CVE-2015-2150: The Linux kernel did not properly restrict access to
PCI command registers, which might have allowed local guest users to
cause a denial of service (non-maskable interrupt and host crash) by
disabling the (1) memory or (2) I/O decoding for a PCI Express device
and then accessing the device, which triggers an Unsupported Request
(UR) response (bsc#919463).
- CVE-2015-0777: drivers/xen/usbback/usbback.c as used in the Linux
kernel 2.6.x and 3.x in SUSE Linux distributions, allowed guest OS users
to obtain sensitive information from uninitialized locations in host OS
kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
not prevent the TS_COMPAT flag from reaching a user-mode task, which
might have allowed local users to bypass the seccomp or audit protection
mechanism via a crafted application that uses the (1) fork or (2) close
system call, as demonstrated by an attack against seccomp before 3.16
(bnc#926240).
- CVE-2015-1805: The Linux kernels implementation of vectored pipe
read and write functionality did not take into account the I/O vectors
that were already processed when retrying after a failed atomic access
operation, potentially resulting in memory corruption due to an I/O vector
array overrun. A local, unprivileged user could use this flaw to crash
the system or, potentially, escalate their privileges on the system.
(bsc#933429).
Also the following non-security bugs were fixed:
- audit: keep inode pinned (bsc#851068).
- btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350).
- btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- cifs: Fix missing crypto allocation (bnc#937402).
- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).
- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails.
- ext3: Fix data corruption in inodes with journalled data (bsc#936637)
- ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm->pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipr: Increase default adapter init stage change timeout (bsc#930761).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn. (bsc#934742)
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- nfsd: Fix nfsv4 opcode decoding error (bsc#935906).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- nfs: never queue requests with rq_cong set on the sending queue (bsc#932458).
- nfsv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Disable Bus Master only on kexec reboot (bsc#920110).
- pci: disable Bus Master on PCI device shutdown (bsc#920110).
- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- pci: Don't try to disable Bus Master on disconnected PCI devices (bsc#920110).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: set host msg status correctly (bnc#933936)
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: avoid mounting of xfs filesystems with inconsistent option (bnc#925705)
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925, LTC#126491).
Patchnames
slertesp3-kernel-rt-201509-12099
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive various security and bugfixes.\n\nThe following feature was added for RT:\n- FATE#317131: The SocketCAN (Peak PCI) driver was added for CAN bus support.\n\nFollowing security bugs were fixed:\n\n- CVE-2015-5707: An integer overflow in the SCSI generic driver could\n be potentially used by local attackers to crash the kernel or execute\n code (bsc#940338).\n- CVE-2015-5364: A remote denial of service (hang) via UDP flood with\n incorrect package checksums was fixed. (bsc#936831).\n- CVE-2015-5366: A remote denial of service (unexpected error returns)\n via UDP flood with incorrect package checksums was fixed. (bsc#936831).\n- CVE-2015-1420: A race condition in the handle_to_path function in\n fs/fhandle.c in the Linux kernel allowed local users to bypass intended\n size restrictions and trigger read operations on additional memory\n locations by changing the handle_bytes value of a file handle during\n the execution of this function (bnc#915517).\n- CVE-2015-4700: A local user could have created a bad instruction in\n the JIT processed BPF code, leading to a kernel crash (bnc#935705).\n- CVE-2015-4167: The UDF filesystem in the Linux kernel was vulnerable\n to a crash which could occur while fetching inode information from a\n corrupted/malicious udf file system image. (bsc#933907).\n- CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731: Various\n issues in handling UDF filesystems in the Linux kernel allowed the\n corruption of kernel memory and other issues. An attacker able to mount\n a corrupted/malicious UDF file system image could cause the kernel to\n crash. (bsc#933904 bsc#933896)\n- CVE-2015-2150: The Linux kernel did not properly restrict access to\n PCI command registers, which might have allowed local guest users to\n cause a denial of service (non-maskable interrupt and host crash) by\n disabling the (1) memory or (2) I/O decoding for a PCI Express device\n and then accessing the device, which triggers an Unsupported Request\n (UR) response (bsc#919463).\n- CVE-2015-0777: drivers/xen/usbback/usbback.c as used in the Linux\n kernel 2.6.x and 3.x in SUSE Linux distributions, allowed guest OS users\n to obtain sensitive information from uninitialized locations in host OS\n kernel memory via unspecified vectors (bnc#917830).\n- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did\n not prevent the TS_COMPAT flag from reaching a user-mode task, which\n might have allowed local users to bypass the seccomp or audit protection\n mechanism via a crafted application that uses the (1) fork or (2) close\n system call, as demonstrated by an attack against seccomp before 3.16\n (bnc#926240).\n- CVE-2015-1805: The Linux kernels implementation of vectored pipe\n read and write functionality did not take into account the I/O vectors\n that were already processed when retrying after a failed atomic access\n operation, potentially resulting in memory corruption due to an I/O vector\n array overrun. A local, unprivileged user could use this flaw to crash\n the system or, potentially, escalate their privileges on the system.\n (bsc#933429).\n\n\nAlso the following non-security bugs were fixed:\n- audit: keep inode pinned (bsc#851068).\n- btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350).\n- btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).\n- btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).\n- cifs: Fix missing crypto allocation (bnc#937402).\n- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).\n- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).\n- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).\n- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).\n- drm/mgag200: Do not do full cleanup if mgag200_device_init fails.\n- ext3: Fix data corruption in inodes with journalled data (bsc#936637)\n- ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).\n- fanotify: Fix deadlock with permission events (bsc#935053).\n- fork: reset mm-\u003epinned_vm (bnc#937855).\n- hrtimer: prevent timer interrupt DoS (bnc#886785).\n- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).\n- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).\n- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).\n- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).\n- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).\n- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).\n- ipr: Increase default adapter init stage change timeout (bsc#930761).\n- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).\n- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).\n- kernel: add panic_on_warn. (bsc#934742)\n- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).\n- libata: prevent HSM state change race between ISR and PIO (bsc#923245).\n- md: use kzalloc() when bitmap is disabled (bsc#939994).\n- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).\n- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).\n- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).\n- mm: restrict access to slab files under procfs and sysfs (bnc#936077).\n- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).\n- net: Fix \u0027ip rule delete table 256\u0027 (bsc#873385).\n- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).\n- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).\n- nfsd: Fix nfsv4 opcode decoding error (bsc#935906).\n- nfsd: support disabling 64bit dir cookies (bnc#937503).\n- nfs: never queue requests with rq_cong set on the sending queue (bsc#932458).\n- nfsv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).\n- pagecache limit: add tracepoints (bnc#924701).\n- pagecache limit: Do not skip over small zones that easily (bnc#925881).\n- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).\n- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).\n- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).\n- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).\n- pci: Disable Bus Master only on kexec reboot (bsc#920110).\n- pci: disable Bus Master on PCI device shutdown (bsc#920110).\n- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).\n- pci: Don\u0027t try to disable Bus Master on disconnected PCI devices (bsc#920110).\n- perf, nmi: Fix unknown NMI warning (bsc#929142).\n- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).\n- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).\n- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)\n- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).\n- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).\n- scsi: set host msg status correctly (bnc#933936)\n- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).\n- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).\n- udf: Remove repeated loads blocksize (bsc#933907).\n- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).\n- vmxnet3: Bump up driver version number (bsc#936423).\n- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).\n- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).\n- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).\n- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).\n- x86, tls: Interpret an all-zero struct user_desc as \u0027no segment\u0027 (bsc#920250).\n- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).\n- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.\n- xfs: avoid mounting of xfs filesystems with inconsistent option (bnc#925705)\n- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925, LTC#126491).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp3-kernel-rt-201509-12099", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1592-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1592-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151592-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1592-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" }, { "category": "self", "summary": "SUSE Bug 851068", "url": "https://bugzilla.suse.com/851068" }, { "category": "self", "summary": "SUSE Bug 867362", "url": "https://bugzilla.suse.com/867362" }, { "category": "self", "summary": "SUSE Bug 873385", "url": "https://bugzilla.suse.com/873385" }, { "category": "self", "summary": "SUSE Bug 883380", "url": "https://bugzilla.suse.com/883380" }, { "category": "self", "summary": "SUSE Bug 886785", "url": "https://bugzilla.suse.com/886785" }, { "category": "self", "summary": "SUSE Bug 894936", "url": "https://bugzilla.suse.com/894936" }, { "category": "self", "summary": "SUSE Bug 915517", "url": "https://bugzilla.suse.com/915517" }, { "category": "self", "summary": "SUSE Bug 917830", "url": "https://bugzilla.suse.com/917830" }, { "category": "self", "summary": "SUSE Bug 919463", "url": "https://bugzilla.suse.com/919463" }, { "category": "self", "summary": "SUSE Bug 920110", "url": "https://bugzilla.suse.com/920110" }, { "category": "self", "summary": "SUSE Bug 920250", "url": "https://bugzilla.suse.com/920250" }, { "category": "self", "summary": "SUSE Bug 920733", "url": "https://bugzilla.suse.com/920733" }, { "category": "self", "summary": "SUSE Bug 921430", "url": "https://bugzilla.suse.com/921430" }, { "category": "self", "summary": "SUSE Bug 923245", "url": "https://bugzilla.suse.com/923245" }, { "category": "self", "summary": "SUSE Bug 924701", "url": "https://bugzilla.suse.com/924701" }, { "category": "self", "summary": "SUSE Bug 925705", "url": "https://bugzilla.suse.com/925705" }, { "category": "self", "summary": "SUSE Bug 925881", "url": "https://bugzilla.suse.com/925881" }, { "category": "self", "summary": "SUSE Bug 925903", "url": "https://bugzilla.suse.com/925903" }, { "category": "self", "summary": "SUSE Bug 926240", "url": "https://bugzilla.suse.com/926240" }, { "category": "self", "summary": "SUSE Bug 926953", "url": "https://bugzilla.suse.com/926953" }, { "category": "self", "summary": "SUSE Bug 927355", "url": "https://bugzilla.suse.com/927355" }, { "category": "self", "summary": "SUSE Bug 927786", "url": "https://bugzilla.suse.com/927786" }, { "category": "self", "summary": "SUSE Bug 929142", "url": "https://bugzilla.suse.com/929142" }, { "category": "self", "summary": "SUSE Bug 929143", "url": "https://bugzilla.suse.com/929143" }, { "category": "self", "summary": "SUSE Bug 930092", "url": "https://bugzilla.suse.com/930092" }, { "category": "self", "summary": "SUSE Bug 930761", "url": "https://bugzilla.suse.com/930761" }, { "category": "self", "summary": "SUSE Bug 930934", "url": "https://bugzilla.suse.com/930934" }, { "category": "self", "summary": "SUSE Bug 931538", "url": "https://bugzilla.suse.com/931538" }, { "category": "self", "summary": "SUSE Bug 932348", "url": "https://bugzilla.suse.com/932348" }, { "category": "self", "summary": "SUSE Bug 932458", "url": "https://bugzilla.suse.com/932458" }, { "category": "self", "summary": "SUSE Bug 933429", "url": "https://bugzilla.suse.com/933429" }, { "category": "self", "summary": "SUSE Bug 933896", "url": "https://bugzilla.suse.com/933896" }, { "category": "self", "summary": "SUSE Bug 933904", "url": "https://bugzilla.suse.com/933904" }, { "category": "self", "summary": "SUSE Bug 933907", "url": "https://bugzilla.suse.com/933907" }, { "category": "self", "summary": "SUSE Bug 933936", "url": "https://bugzilla.suse.com/933936" }, { "category": "self", "summary": "SUSE Bug 934742", "url": "https://bugzilla.suse.com/934742" }, { "category": "self", "summary": "SUSE Bug 934944", "url": "https://bugzilla.suse.com/934944" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935572", "url": "https://bugzilla.suse.com/935572" }, { "category": "self", "summary": "SUSE Bug 935705", "url": "https://bugzilla.suse.com/935705" }, { "category": "self", "summary": "SUSE Bug 935866", "url": "https://bugzilla.suse.com/935866" }, { "category": "self", "summary": "SUSE Bug 935906", "url": "https://bugzilla.suse.com/935906" }, { "category": "self", "summary": "SUSE Bug 936077", "url": "https://bugzilla.suse.com/936077" }, { "category": "self", "summary": "SUSE Bug 936423", "url": "https://bugzilla.suse.com/936423" }, { "category": "self", "summary": "SUSE Bug 936637", "url": "https://bugzilla.suse.com/936637" }, { "category": "self", "summary": "SUSE Bug 936831", "url": "https://bugzilla.suse.com/936831" }, { "category": "self", "summary": "SUSE Bug 936875", "url": "https://bugzilla.suse.com/936875" }, { "category": "self", "summary": "SUSE Bug 936925", "url": "https://bugzilla.suse.com/936925" }, { "category": "self", "summary": "SUSE Bug 937032", "url": "https://bugzilla.suse.com/937032" }, { "category": "self", "summary": "SUSE Bug 937402", "url": "https://bugzilla.suse.com/937402" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 937503", "url": "https://bugzilla.suse.com/937503" }, { "category": "self", "summary": "SUSE Bug 937641", "url": "https://bugzilla.suse.com/937641" }, { "category": "self", "summary": "SUSE Bug 937855", "url": "https://bugzilla.suse.com/937855" }, { "category": "self", "summary": "SUSE Bug 939910", "url": "https://bugzilla.suse.com/939910" }, { "category": "self", "summary": "SUSE Bug 939994", "url": "https://bugzilla.suse.com/939994" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940398", "url": "https://bugzilla.suse.com/940398" }, { "category": "self", "summary": "SUSE Bug 942350", "url": "https://bugzilla.suse.com/942350" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9728 page", "url": "https://www.suse.com/security/cve/CVE-2014-9728/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9729 page", "url": "https://www.suse.com/security/cve/CVE-2014-9729/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9730 page", "url": "https://www.suse.com/security/cve/CVE-2014-9730/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9731 page", "url": "https://www.suse.com/security/cve/CVE-2014-9731/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0777 page", "url": "https://www.suse.com/security/cve/CVE-2015-0777/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1420 page", "url": "https://www.suse.com/security/cve/CVE-2015-1420/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1805 page", "url": "https://www.suse.com/security/cve/CVE-2015-1805/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2150 page", "url": "https://www.suse.com/security/cve/CVE-2015-2150/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2830 page", "url": "https://www.suse.com/security/cve/CVE-2015-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4167 page", "url": "https://www.suse.com/security/cve/CVE-2015-4167/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4700 page", "url": "https://www.suse.com/security/cve/CVE-2015-4700/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5364 page", "url": "https://www.suse.com/security/cve/CVE-2015-5364/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5366 page", "url": "https://www.suse.com/security/cve/CVE-2015-5366/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-09-09T17:05:11Z", "generator": { "date": "2015-09-09T17:05:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1592-1", "initial_release_date": "2015-09-09T17:05:11Z", "revision_history": [ { "date": "2015-09-09T17:05:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-0.33.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-0.33.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9728" } ], "notes": [ { "category": "general", "text": "The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9728", "url": "https://www.suse.com/security/cve/CVE-2014-9728" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9728", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933904 for CVE-2014-9728", "url": "https://bugzilla.suse.com/933904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "low" } ], "title": "CVE-2014-9728" }, { "cve": "CVE-2014-9729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9729" } ], "notes": [ { "category": "general", "text": "The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9729", "url": "https://www.suse.com/security/cve/CVE-2014-9729" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9729", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933904 for CVE-2014-9729", "url": "https://bugzilla.suse.com/933904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "low" } ], "title": "CVE-2014-9729" }, { "cve": "CVE-2014-9730", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9730" } ], "notes": [ { "category": "general", "text": "The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9730", "url": "https://www.suse.com/security/cve/CVE-2014-9730" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9730", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933904 for CVE-2014-9730", "url": "https://bugzilla.suse.com/933904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "low" } ], "title": "CVE-2014-9730" }, { "cve": "CVE-2014-9731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9731" } ], "notes": [ { "category": "general", "text": "The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target\u0027s name along with a trailing \\0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9731", "url": "https://www.suse.com/security/cve/CVE-2014-9731" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9731", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933896 for CVE-2014-9731", "url": "https://bugzilla.suse.com/933896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "moderate" } ], "title": "CVE-2014-9731" }, { "cve": "CVE-2015-0777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0777" } ], "notes": [ { "category": "general", "text": "drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0777", "url": "https://www.suse.com/security/cve/CVE-2015-0777" }, { "category": "external", "summary": "SUSE Bug 917830 for CVE-2015-0777", "url": "https://bugzilla.suse.com/917830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "low" } ], "title": "CVE-2015-0777" }, { "cve": "CVE-2015-1420", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1420" } ], "notes": [ { "category": "general", "text": "Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1420", "url": "https://www.suse.com/security/cve/CVE-2015-1420" }, { "category": "external", "summary": "SUSE Bug 915517 for CVE-2015-1420", "url": "https://bugzilla.suse.com/915517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "moderate" } ], "title": "CVE-2015-1420" }, { "cve": "CVE-2015-1805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1805" } ], "notes": [ { "category": "general", "text": "The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an \"I/O vector array overrun.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1805", "url": "https://www.suse.com/security/cve/CVE-2015-1805" }, { "category": "external", "summary": "SUSE Bug 917839 for CVE-2015-1805", "url": "https://bugzilla.suse.com/917839" }, { "category": "external", "summary": "SUSE Bug 933429 for CVE-2015-1805", "url": "https://bugzilla.suse.com/933429" }, { "category": "external", "summary": "SUSE Bug 939270 for CVE-2015-1805", "url": "https://bugzilla.suse.com/939270" }, { "category": "external", "summary": "SUSE Bug 964730 for CVE-2015-1805", "url": "https://bugzilla.suse.com/964730" }, { "category": "external", "summary": "SUSE Bug 964732 for CVE-2015-1805", "url": "https://bugzilla.suse.com/964732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "important" } ], "title": "CVE-2015-1805" }, { "cve": "CVE-2015-2150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2150" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2150", "url": "https://www.suse.com/security/cve/CVE-2015-2150" }, { "category": "external", "summary": "SUSE Bug 800280 for CVE-2015-2150", "url": "https://bugzilla.suse.com/800280" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2150", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 919463 for CVE-2015-2150", "url": "https://bugzilla.suse.com/919463" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "moderate" } ], "title": "CVE-2015-2150" }, { "cve": "CVE-2015-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2830" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2830", "url": "https://www.suse.com/security/cve/CVE-2015-2830" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2830", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 926240 for CVE-2015-2830", "url": "https://bugzilla.suse.com/926240" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "moderate" } ], "title": "CVE-2015-2830" }, { "cve": "CVE-2015-4167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4167" } ], "notes": [ { "category": "general", "text": "The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4167", "url": "https://www.suse.com/security/cve/CVE-2015-4167" }, { "category": "external", "summary": "SUSE Bug 917839 for CVE-2015-4167", "url": "https://bugzilla.suse.com/917839" }, { "category": "external", "summary": "SUSE Bug 933907 for CVE-2015-4167", "url": "https://bugzilla.suse.com/933907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "moderate" } ], "title": "CVE-2015-4167" }, { "cve": "CVE-2015-4700", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4700" } ], "notes": [ { "category": "general", "text": "The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4700", "url": "https://www.suse.com/security/cve/CVE-2015-4700" }, { "category": "external", "summary": "SUSE Bug 935705 for CVE-2015-4700", "url": "https://bugzilla.suse.com/935705" }, { "category": "external", "summary": "SUSE Bug 939273 for CVE-2015-4700", "url": "https://bugzilla.suse.com/939273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "moderate" } ], "title": "CVE-2015-4700" }, { "cve": "CVE-2015-5364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5364" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5364", "url": "https://www.suse.com/security/cve/CVE-2015-5364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5364", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5364", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5364", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5364", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5364", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "moderate" } ], "title": "CVE-2015-5364" }, { "cve": "CVE-2015-5366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5366" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5366", "url": "https://www.suse.com/security/cve/CVE-2015-5366" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5366", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5366", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5366", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5366", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "moderate" } ], "title": "CVE-2015-5366" }, { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.40.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-09-09T17:05:11Z", "details": "moderate" } ], "title": "CVE-2015-5707" } ] }
suse-su-2015:1678-1
Vulnerability from csaf_suse
Published
2015-09-08 16:29
Modified
2015-09-08 16:29
Summary
Security update for kernel-source
Notes
Title of the patch
Security update for kernel-source
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
security and bugfixes.
Following security bugs were fixed:
* CVE-2015-6252: Possible file descriptor leak for each
VHOST_SET_LOG_FDcommand issued, this could eventually wasting available
system resources and creating a denial of service (bsc#942367).
* CVE-2015-5707: Possible integer overflow in the calculation of total
number of pages in bio_map_user_iov() (bsc#940338).
* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
the Linux kernel before 4.0.6 do not properly consider yielding a
processor, which allowed remote attackers to cause a denial of service
(system hang) via incorrect checksums within a UDP packet flood
(bsc#936831).
* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return
values, which allowed remote attackers to cause a denial of service
(EPOLLET epoll application read outage) via an incorrect checksum in a
UDP packet, a different vulnerability than CVE-2015-5364 (bsc#936831).
* CVE-2015-1420: Race condition in the handle_to_path function in
fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to
bypass intended size restrictions and trigger read operations on
additional memory locations by changing the handle_bytes value of a
file handle during the execution of this function (bsc#915517).
* CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
fs/pipe.c in the Linux kernel before 3.16 do not properly consider the
side effects of failed __copy_to_user_inatomic and
__copy_from_user_inatomic calls, which allows local users to cause a
denial of service (system crash) or possibly gain privileges via a
crafted application, aka an 'I/O' vector array overrun. (bsc#933429)
* CVE-2015-2150: Xen 3.3.x through 4.5.x and the Linux kernel through
3.19.1 do not properly restrict access to PCI command registers, which
might allow local guest users to cause a denial of service
(non-maskable interrupt and host crash) by disabling the (1) memory or
(2) I/O decoding for a PCI Express device and then accessing the
device, which triggers an Unsupported Request (UR) response.
(bsc#919463)
* CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel before
3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode
task, which might allow local users to bypass the seccomp or audit
protection mechanism via a crafted application that uses the (1) fork
or (2) close system call, as demonstrated by an attack against seccomp
before 3.16. (bsc#926240)
* CVE-2015-4700: The bpf_int_jit_compile function in
arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed
local users to cause a denial of service (system crash) by creating a
packet filter and then loading crafted BPF instructions that trigger
late convergence by the JIT compiler (bsc#935705).
* CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the
Linux kernel before 3.19.1 did not validate certain length values,
which allowed local users to cause a denial of service (incorrect data
representation or integer overflow, and OOPS) via a crafted UDF
filesystem (bsc#933907).
* CVE-2015-0777: drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0
(aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as
used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions,
allows guest OS users to obtain sensitive information from
uninitialized locations in host OS kernel memory via unspecified
vectors. (bsc#917830)
* CVE-2014-9728: The UDF filesystem implementation in the Linux kernel
before 3.18.2 did not validate certain lengths, which allowed local
users to cause a denial of service (buffer over-read and system crash)
via a crafted filesystem image, related to fs/udf/inode.c and
fs/udf/symlink.c (bsc#933904).
* CVE-2014-9730: The udf_pc_to_char function in fs/udf/symlink.c in the
Linux kernel before 3.18.2 relies on component lengths that are unused,
which allowed local users to cause a denial of service (system crash)
via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9729: The udf_read_inode function in fs/udf/inode.c in the
Linux kernel before 3.18.2 did not ensure a certain data-structure size
consistency, which allowed local users to cause a denial of service
(system crash) via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9731: The UDF filesystem implementation in the Linux kernel
before 3.18.2 did not ensure that space is available for storing a
symlink target's name along with a trailing \0 character, which allowed
local users to obtain sensitive information via a crafted filesystem
image, related to fs/udf/symlink.c and fs/udf/unicode.c (bsc#933896).
The following non-security bugs were fixed:
- Btrfs: be aware of btree inode write errors to avoid fs corruption
(bnc#942350).
- Btrfs: be aware of btree inode write errors to avoid fs corruption
(bnc#942404).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942404).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942404).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- Btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- DRM/i915: Get rid of the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938).
- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).
- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- Ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level (bsc#923002).
- NFS: never queue requests with rq_cong set on the sending queue (bsc#932458).
- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).
- NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- PCI: Disable Bus Master only on kexec reboot (bsc#920110).
- PCI: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- PCI: Do not try to disable Bus Master on disconnected PCI devices (bsc#920110).
- PCI: Lock down register access when trusted_kernel is true (fate#314486, bnc#884333)(bsc#923431).
- PCI: disable Bus Master on PCI device shutdown (bsc#920110).
- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).
- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).
- Apparmor: fix file_permission if profile is updated (bsc#917968).
- block: Discard bios do not have data (bsc#928988).
- cifs: Fix missing crypto allocation (bnc#937402).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails (FATE#317582).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (FATE#317582).
- drm: ast,cirrus,mgag200: use drm_can_sleep (FATE#317582, bnc#883380, bsc#935572).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- exec: kill the unnecessary mm->def_flags setting in load_elf_binary() (fate#317831,bnc#891116)).
- ext3: Fix data corruption in inodes with journalled data (bsc#936637).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm->pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).
- ibmveth: Add GRO support (bsc#935055).
- ibmveth: Add support for Large Receive Offload (bsc#935055).
- ibmveth: Add support for TSO (bsc#935055).
- ibmveth: add support for TSO6.
- ibmveth: change rx buffer default allocation for CMO (bsc#935055).
- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change (bsc920110).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn.
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477, LTC#129509).
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM Performance).
- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).
- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).
- mm, thp: only collapse hugepages to nodes with affinity for zone_reclaim_mode (VM Functionality, bnc#931620).
- mm, thp: really limit transparent hugepage allocation to local node (VM Performance, bnc#931620).
- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM Performance, bnc#931620).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM Performance, bnc#931620).
- mm/thp: allocate transparent hugepages on local node (VM Performance, bnc#931620).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- mm: thp: khugepaged: add policy for finding target node (VM Functionality, bnc#931620).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (FATE#309111, bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp() (bsc#936095).
- r8169: remember WOL preferences on driver load (bsc#942305).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi: Correctly set the scsi host/msg/status bytes (bnc#933936).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).
- scsi: Moved iscsi kabi patch to patches.kabi (bsc#923002)
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg_start_req(): make sure that there's not too many elements in iovec (bsc#940338).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- supported.conf: enable sch_mqprio (bsc#932882)
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86-64: Do not apply destructive erratum workaround on unaffected CPUs (bsc#929076).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: fix problem when using md+XFS under high load (bnc#925705).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
- xhci: do not report PLC when link is in internal resume state (bnc#933721).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921, bnc#936925, LTC#126491).
Patchnames
sdksp4-kernel-20150908-12114,sledsp4-kernel-20150908-12114,slessp4-kernel-20150908-12114,slexsp3-kernel-20150908-12114
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-source", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various\nsecurity and bugfixes.\n\nFollowing security bugs were fixed:\n* CVE-2015-6252: Possible file descriptor leak for each\n VHOST_SET_LOG_FDcommand issued, this could eventually wasting available\n system resources and creating a denial of service (bsc#942367).\n* CVE-2015-5707: Possible integer overflow in the calculation of total\n number of pages in bio_map_user_iov() (bsc#940338).\n* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in\n the Linux kernel before 4.0.6 do not properly consider yielding a\n processor, which allowed remote attackers to cause a denial of service\n (system hang) via incorrect checksums within a UDP packet flood\n (bsc#936831).\n* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in\n the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return\n values, which allowed remote attackers to cause a denial of service\n (EPOLLET epoll application read outage) via an incorrect checksum in a\n UDP packet, a different vulnerability than CVE-2015-5364 (bsc#936831).\n* CVE-2015-1420: Race condition in the handle_to_path function in\n fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to\n bypass intended size restrictions and trigger read operations on\n additional memory locations by changing the handle_bytes value of a\n file handle during the execution of this function (bsc#915517).\n* CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in\n fs/pipe.c in the Linux kernel before 3.16 do not properly consider the\n side effects of failed __copy_to_user_inatomic and\n __copy_from_user_inatomic calls, which allows local users to cause a\n denial of service (system crash) or possibly gain privileges via a\n crafted application, aka an \u0027I/O\u0027 vector array overrun. (bsc#933429)\n* CVE-2015-2150: Xen 3.3.x through 4.5.x and the Linux kernel through\n 3.19.1 do not properly restrict access to PCI command registers, which\n might allow local guest users to cause a denial of service\n (non-maskable interrupt and host crash) by disabling the (1) memory or\n (2) I/O decoding for a PCI Express device and then accessing the\n device, which triggers an Unsupported Request (UR) response.\n (bsc#919463)\n* CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel before\n 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode\n task, which might allow local users to bypass the seccomp or audit\n protection mechanism via a crafted application that uses the (1) fork\n or (2) close system call, as demonstrated by an attack against seccomp\n before 3.16. (bsc#926240)\n* CVE-2015-4700: The bpf_int_jit_compile function in\n arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed\n local users to cause a denial of service (system crash) by creating a\n packet filter and then loading crafted BPF instructions that trigger\n late convergence by the JIT compiler (bsc#935705).\n* CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the\n Linux kernel before 3.19.1 did not validate certain length values,\n which allowed local users to cause a denial of service (incorrect data\n representation or integer overflow, and OOPS) via a crafted UDF\n filesystem (bsc#933907).\n* CVE-2015-0777: drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0\n (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as\n used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions,\n allows guest OS users to obtain sensitive information from\n uninitialized locations in host OS kernel memory via unspecified\n vectors. (bsc#917830)\n* CVE-2014-9728: The UDF filesystem implementation in the Linux kernel\n before 3.18.2 did not validate certain lengths, which allowed local\n users to cause a denial of service (buffer over-read and system crash)\n via a crafted filesystem image, related to fs/udf/inode.c and\n fs/udf/symlink.c (bsc#933904).\n* CVE-2014-9730: The udf_pc_to_char function in fs/udf/symlink.c in the\n Linux kernel before 3.18.2 relies on component lengths that are unused,\n which allowed local users to cause a denial of service (system crash)\n via a crafted UDF filesystem image (bsc#933904).\n* CVE-2014-9729: The udf_read_inode function in fs/udf/inode.c in the\n Linux kernel before 3.18.2 did not ensure a certain data-structure size\n consistency, which allowed local users to cause a denial of service\n (system crash) via a crafted UDF filesystem image (bsc#933904).\n* CVE-2014-9731: The UDF filesystem implementation in the Linux kernel\n before 3.18.2 did not ensure that space is available for storing a\n symlink target\u0027s name along with a trailing \\0 character, which allowed\n local users to obtain sensitive information via a crafted filesystem\n image, related to fs/udf/symlink.c and fs/udf/unicode.c (bsc#933896).\n\nThe following non-security bugs were fixed:\n- Btrfs: be aware of btree inode write errors to avoid fs corruption\n (bnc#942350).\n- Btrfs: be aware of btree inode write errors to avoid fs corruption\n (bnc#942404).\n- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).\n- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942404).\n- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).\n- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942404).\n- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).\n- Btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).\n- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).\n- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).\n- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).\n- DRM/i915: Get rid of the \u0027hotplug_supported_mask\u0027 in struct drm_i915_private (bsc#942938).\n- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).\n- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).\n- Ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).\n- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).\n- IB/iser: Add Discovery support (bsc#923002).\n- IB/iser: Move informational messages from error to info level (bsc#923002).\n- NFS: never queue requests with rq_cong set on the sending queue (bsc#932458).\n- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).\n- NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).\n- PCI: Disable Bus Master only on kexec reboot (bsc#920110).\n- PCI: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).\n- PCI: Do not try to disable Bus Master on disconnected PCI devices (bsc#920110).\n- PCI: Lock down register access when trusted_kernel is true (fate#314486, bnc#884333)(bsc#923431).\n- PCI: disable Bus Master on PCI device shutdown (bsc#920110).\n- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).\n- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).\n- Apparmor: fix file_permission if profile is updated (bsc#917968).\n- block: Discard bios do not have data (bsc#928988).\n- cifs: Fix missing crypto allocation (bnc#937402).\n- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).\n- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).\n- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).\n- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).\n- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).\n- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).\n- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).\n- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).\n- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).\n- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).\n- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).\n- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).\n- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).\n- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).\n- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).\n- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).\n- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).\n- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).\n- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).\n- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).\n- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).\n- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).\n- drm/i915: fix hotplug event bit tracking (bsc#942938).\n- drm/i915: fix hpd interrupt register locking (bsc#942938).\n- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).\n- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).\n- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).\n- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).\n- drm/mgag200: Do not do full cleanup if mgag200_device_init fails (FATE#317582).\n- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (FATE#317582).\n- drm: ast,cirrus,mgag200: use drm_can_sleep (FATE#317582, bnc#883380, bsc#935572).\n- ehci-pci: enable interrupt on BayTrail (bnc926007).\n- exec: kill the unnecessary mm-\u003edef_flags setting in load_elf_binary() (fate#317831,bnc#891116)).\n- ext3: Fix data corruption in inodes with journalled data (bsc#936637). \n- fanotify: Fix deadlock with permission events (bsc#935053).\n- fork: reset mm-\u003epinned_vm (bnc#937855).\n- hrtimer: prevent timer interrupt DoS (bnc#886785).\n- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).\n- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).\n- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).\n- ibmveth: Add GRO support (bsc#935055).\n- ibmveth: Add support for Large Receive Offload (bsc#935055).\n- ibmveth: Add support for TSO (bsc#935055).\n- ibmveth: add support for TSO6.\n- ibmveth: change rx buffer default allocation for CMO (bsc#935055).\n- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).\n- inotify: Fix nested sleeps in inotify_read() (bsc#940925).\n- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).\n- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).\n- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).\n- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).\n- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change (bsc920110).\n- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).\n- kernel: add panic_on_warn.\n- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477, LTC#129509).\n- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).\n- libata: prevent HSM state change race between ISR and PIO (bsc#923245).\n- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- md: use kzalloc() when bitmap is disabled (bsc#939994).\n- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).\n- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).\n- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).\n- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM Performance).\n- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).\n- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).\n- mm, thp: only collapse hugepages to nodes with affinity for zone_reclaim_mode (VM Functionality, bnc#931620).\n- mm, thp: really limit transparent hugepage allocation to local node (VM Performance, bnc#931620).\n- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM Performance, bnc#931620).\n- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).\n- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM Performance, bnc#931620).\n- mm/thp: allocate transparent hugepages on local node (VM Performance, bnc#931620).\n- mm: make page pfmemalloc check more robust (bnc#920016).\n- mm: restrict access to slab files under procfs and sysfs (bnc#936077).\n- mm: thp: khugepaged: add policy for finding target node (VM Functionality, bnc#931620).\n- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).\n- net: Fix \u0027ip rule delete table 256\u0027 (bsc#873385).\n- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).\n- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).\n- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).\n- nfsd: support disabling 64bit dir cookies (bnc#937503).\n- pagecache limit: Do not skip over small zones that easily (bnc#925881).\n- pagecache limit: add tracepoints (bnc#924701).\n- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).\n- pagecache limit: fix wrong nr_reclaimed count (FATE#309111, bnc#924701).\n- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).\n- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).\n- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).\n- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).\n- perf, nmi: Fix unknown NMI warning (bsc#929142).\n- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).\n- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp() (bsc#936095).\n- r8169: remember WOL preferences on driver load (bsc#942305).\n- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).\n- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)\n- scsi: Correctly set the scsi host/msg/status bytes (bnc#933936).\n- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).\n- scsi: Moved iscsi kabi patch to patches.kabi (bsc#923002)\n- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).\n- scsi: kabi: allow iscsi disocvery session support (bsc#923002).\n- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).\n- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).\n- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- sg_start_req(): make sure that there\u0027s not too many elements in iovec (bsc#940338).\n- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).\n- supported.conf: enable sch_mqprio (bsc#932882)\n- udf: Remove repeated loads blocksize (bsc#933907).\n- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).\n- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).\n- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).\n- vmxnet3: Bump up driver version number (bsc#936423).\n- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).\n- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).\n- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).\n- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).\n- x86, tls: Interpret an all-zero struct user_desc as \u0027no segment\u0027 (bsc#920250).\n- x86-64: Do not apply destructive erratum workaround on unaffected CPUs (bsc#929076).\n- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).\n- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).\n- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.\n- xfs: fix problem when using md+XFS under high load (bnc#925705).\n- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).\n- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).\n- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).\n- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).\n- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).\n- xhci: do not report PLC when link is in internal resume state (bnc#933721).\n- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).\n- xhci: report U3 when link is in resume state (bnc#933721).\n- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).\n- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921, bnc#936925, LTC#126491).", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-20150908-12114,sledsp4-kernel-20150908-12114,slessp4-kernel-20150908-12114,slexsp3-kernel-20150908-12114", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1678-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1678-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151678-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1678-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" }, { "category": "self", "summary": "SUSE Bug 777565", "url": "https://bugzilla.suse.com/777565" }, { "category": "self", "summary": "SUSE Bug 867362", "url": "https://bugzilla.suse.com/867362" }, { "category": "self", "summary": "SUSE Bug 873385", "url": "https://bugzilla.suse.com/873385" }, { "category": "self", "summary": "SUSE Bug 883380", "url": "https://bugzilla.suse.com/883380" }, { "category": "self", "summary": "SUSE Bug 884333", "url": "https://bugzilla.suse.com/884333" }, { "category": "self", "summary": "SUSE Bug 886785", "url": "https://bugzilla.suse.com/886785" }, { "category": "self", "summary": "SUSE Bug 891116", "url": "https://bugzilla.suse.com/891116" }, { "category": "self", "summary": "SUSE Bug 894936", "url": "https://bugzilla.suse.com/894936" }, { "category": "self", "summary": "SUSE Bug 915517", "url": "https://bugzilla.suse.com/915517" }, { "category": "self", "summary": "SUSE Bug 917830", "url": "https://bugzilla.suse.com/917830" }, { "category": "self", "summary": "SUSE Bug 917968", "url": "https://bugzilla.suse.com/917968" }, { "category": "self", "summary": "SUSE Bug 919463", "url": "https://bugzilla.suse.com/919463" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 920110", "url": "https://bugzilla.suse.com/920110" }, { "category": "self", "summary": "SUSE Bug 920250", "url": "https://bugzilla.suse.com/920250" }, { "category": "self", "summary": "SUSE Bug 920733", "url": "https://bugzilla.suse.com/920733" }, { "category": "self", "summary": "SUSE Bug 921430", "url": "https://bugzilla.suse.com/921430" }, { "category": "self", "summary": "SUSE Bug 923002", "url": "https://bugzilla.suse.com/923002" }, { "category": "self", "summary": "SUSE Bug 923245", "url": "https://bugzilla.suse.com/923245" }, { "category": "self", "summary": "SUSE Bug 923431", "url": "https://bugzilla.suse.com/923431" }, { "category": "self", "summary": "SUSE Bug 924701", "url": "https://bugzilla.suse.com/924701" }, { "category": "self", "summary": "SUSE Bug 925705", "url": "https://bugzilla.suse.com/925705" }, { "category": "self", "summary": "SUSE Bug 925881", "url": "https://bugzilla.suse.com/925881" }, { "category": "self", "summary": "SUSE Bug 925903", "url": "https://bugzilla.suse.com/925903" }, { "category": "self", "summary": "SUSE Bug 926240", "url": "https://bugzilla.suse.com/926240" }, { "category": "self", "summary": "SUSE Bug 926953", "url": "https://bugzilla.suse.com/926953" }, { "category": "self", "summary": "SUSE Bug 927355", "url": "https://bugzilla.suse.com/927355" }, { "category": "self", "summary": "SUSE Bug 928988", "url": "https://bugzilla.suse.com/928988" }, { "category": "self", "summary": "SUSE Bug 929076", "url": "https://bugzilla.suse.com/929076" }, { "category": "self", "summary": "SUSE Bug 929142", "url": "https://bugzilla.suse.com/929142" }, { "category": "self", "summary": "SUSE Bug 929143", "url": "https://bugzilla.suse.com/929143" }, { "category": "self", "summary": "SUSE Bug 930092", "url": "https://bugzilla.suse.com/930092" }, { "category": "self", "summary": "SUSE Bug 930934", "url": "https://bugzilla.suse.com/930934" }, { "category": "self", "summary": "SUSE Bug 931620", "url": "https://bugzilla.suse.com/931620" }, { "category": "self", "summary": "SUSE Bug 932350", "url": "https://bugzilla.suse.com/932350" }, { "category": "self", "summary": "SUSE Bug 932458", "url": "https://bugzilla.suse.com/932458" }, { "category": "self", "summary": "SUSE Bug 932882", "url": "https://bugzilla.suse.com/932882" }, { "category": "self", "summary": "SUSE Bug 933429", "url": "https://bugzilla.suse.com/933429" }, { "category": "self", "summary": "SUSE Bug 933721", "url": "https://bugzilla.suse.com/933721" }, { "category": "self", "summary": "SUSE Bug 933896", "url": "https://bugzilla.suse.com/933896" }, { "category": "self", "summary": "SUSE Bug 933904", "url": "https://bugzilla.suse.com/933904" }, { "category": "self", "summary": "SUSE Bug 933907", "url": "https://bugzilla.suse.com/933907" }, { "category": "self", "summary": "SUSE Bug 933936", "url": "https://bugzilla.suse.com/933936" }, { "category": "self", "summary": "SUSE Bug 934944", "url": "https://bugzilla.suse.com/934944" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935055", "url": "https://bugzilla.suse.com/935055" }, { "category": "self", "summary": "SUSE Bug 935572", "url": "https://bugzilla.suse.com/935572" }, { "category": "self", "summary": "SUSE Bug 935705", "url": "https://bugzilla.suse.com/935705" }, { "category": "self", "summary": "SUSE Bug 935866", "url": "https://bugzilla.suse.com/935866" }, { "category": "self", "summary": "SUSE Bug 935906", "url": "https://bugzilla.suse.com/935906" }, { "category": "self", "summary": "SUSE Bug 936077", "url": "https://bugzilla.suse.com/936077" }, { "category": "self", "summary": "SUSE Bug 936095", "url": "https://bugzilla.suse.com/936095" }, { "category": "self", "summary": "SUSE Bug 936118", "url": "https://bugzilla.suse.com/936118" }, { "category": "self", "summary": "SUSE Bug 936423", "url": "https://bugzilla.suse.com/936423" }, { "category": "self", "summary": "SUSE Bug 936637", "url": "https://bugzilla.suse.com/936637" }, { "category": "self", "summary": "SUSE Bug 936831", "url": "https://bugzilla.suse.com/936831" }, { "category": "self", "summary": "SUSE Bug 936875", "url": "https://bugzilla.suse.com/936875" }, { "category": "self", "summary": "SUSE Bug 936921", "url": "https://bugzilla.suse.com/936921" }, { "category": "self", "summary": "SUSE Bug 936925", "url": "https://bugzilla.suse.com/936925" }, { "category": "self", "summary": "SUSE Bug 937032", "url": "https://bugzilla.suse.com/937032" }, { "category": "self", "summary": "SUSE Bug 937256", "url": "https://bugzilla.suse.com/937256" }, { "category": "self", "summary": "SUSE Bug 937402", "url": "https://bugzilla.suse.com/937402" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 937503", "url": "https://bugzilla.suse.com/937503" }, { "category": "self", "summary": "SUSE Bug 937641", "url": "https://bugzilla.suse.com/937641" }, { "category": "self", "summary": "SUSE Bug 937855", "url": "https://bugzilla.suse.com/937855" }, { "category": "self", "summary": "SUSE Bug 938485", "url": "https://bugzilla.suse.com/938485" }, { "category": "self", "summary": "SUSE Bug 939910", "url": "https://bugzilla.suse.com/939910" }, { "category": "self", "summary": "SUSE Bug 939994", "url": "https://bugzilla.suse.com/939994" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940398", "url": "https://bugzilla.suse.com/940398" }, { "category": "self", "summary": "SUSE Bug 940925", "url": "https://bugzilla.suse.com/940925" }, { "category": "self", "summary": "SUSE Bug 940966", "url": "https://bugzilla.suse.com/940966" }, { "category": "self", "summary": "SUSE Bug 942204", "url": "https://bugzilla.suse.com/942204" }, { "category": "self", "summary": "SUSE Bug 942305", "url": "https://bugzilla.suse.com/942305" }, { "category": "self", "summary": "SUSE Bug 942350", "url": "https://bugzilla.suse.com/942350" }, { "category": "self", "summary": "SUSE Bug 942367", "url": "https://bugzilla.suse.com/942367" }, { "category": "self", "summary": "SUSE Bug 942404", "url": "https://bugzilla.suse.com/942404" }, { "category": "self", "summary": "SUSE Bug 942605", "url": "https://bugzilla.suse.com/942605" }, { "category": "self", "summary": "SUSE Bug 942688", "url": "https://bugzilla.suse.com/942688" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943477", "url": "https://bugzilla.suse.com/943477" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9728 page", "url": "https://www.suse.com/security/cve/CVE-2014-9728/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9729 page", "url": "https://www.suse.com/security/cve/CVE-2014-9729/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9730 page", "url": "https://www.suse.com/security/cve/CVE-2014-9730/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9731 page", "url": "https://www.suse.com/security/cve/CVE-2014-9731/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0777 page", "url": "https://www.suse.com/security/cve/CVE-2015-0777/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1420 page", "url": "https://www.suse.com/security/cve/CVE-2015-1420/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1805 page", "url": "https://www.suse.com/security/cve/CVE-2015-1805/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2150 page", "url": "https://www.suse.com/security/cve/CVE-2015-2150/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2830 page", "url": "https://www.suse.com/security/cve/CVE-2015-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4167 page", "url": "https://www.suse.com/security/cve/CVE-2015-4167/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4700 page", "url": "https://www.suse.com/security/cve/CVE-2015-4700/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5364 page", "url": "https://www.suse.com/security/cve/CVE-2015-5364/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5366 page", "url": "https://www.suse.com/security/cve/CVE-2015-5366/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6252 page", "url": "https://www.suse.com/security/cve/CVE-2015-6252/" } ], "title": "Security update for kernel-source", "tracking": { "current_release_date": "2015-09-08T16:29:34Z", "generator": { "date": "2015-09-08T16:29:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1678-1", "initial_release_date": "2015-09-08T16:29:34Z", "revision_history": [ { "date": "2015-09-08T16:29:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-65.1.i586", "product": { "name": "kernel-default-3.0.101-65.1.i586", "product_id": "kernel-default-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-65.1.i586", "product": { "name": "kernel-default-base-3.0.101-65.1.i586", "product_id": "kernel-default-base-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-65.1.i586", "product": { "name": "kernel-default-devel-3.0.101-65.1.i586", "product_id": "kernel-default-devel-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-65.1.i586", "product": { "name": "kernel-default-extra-3.0.101-65.1.i586", "product_id": "kernel-default-extra-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-65.1.i586", "product": { "name": "kernel-pae-3.0.101-65.1.i586", "product_id": "kernel-pae-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-65.1.i586", "product": { "name": "kernel-pae-base-3.0.101-65.1.i586", "product_id": "kernel-pae-base-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-65.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-65.1.i586", "product_id": "kernel-pae-devel-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-pae-extra-3.0.101-65.1.i586", "product": { "name": "kernel-pae-extra-3.0.101-65.1.i586", "product_id": "kernel-pae-extra-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-65.1.i586", "product": { "name": "kernel-source-3.0.101-65.1.i586", "product_id": "kernel-source-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-65.1.i586", "product": { "name": "kernel-syms-3.0.101-65.1.i586", "product_id": "kernel-syms-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-65.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-65.1.i586", "product_id": "kernel-trace-devel-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-65.1.i586", "product": { "name": "kernel-xen-3.0.101-65.1.i586", "product_id": "kernel-xen-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-65.1.i586", "product": { "name": "kernel-xen-base-3.0.101-65.1.i586", "product_id": "kernel-xen-base-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-65.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-65.1.i586", "product_id": "kernel-xen-devel-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-65.1.i586", "product": { "name": "kernel-xen-extra-3.0.101-65.1.i586", "product_id": "kernel-xen-extra-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-65.1.i586", "product": { "name": "kernel-ec2-3.0.101-65.1.i586", "product_id": "kernel-ec2-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-65.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-65.1.i586", "product_id": "kernel-ec2-base-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-65.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-65.1.i586", "product_id": "kernel-ec2-devel-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-65.1.i586", "product": { "name": "kernel-trace-3.0.101-65.1.i586", "product_id": "kernel-trace-3.0.101-65.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-65.1.i586", "product": { "name": "kernel-trace-base-3.0.101-65.1.i586", "product_id": "kernel-trace-base-3.0.101-65.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-65.1.ia64", "product": { "name": "kernel-default-3.0.101-65.1.ia64", "product_id": "kernel-default-3.0.101-65.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-65.1.ia64", "product": { "name": "kernel-default-base-3.0.101-65.1.ia64", "product_id": "kernel-default-base-3.0.101-65.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-65.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-65.1.ia64", "product_id": "kernel-default-devel-3.0.101-65.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-65.1.ia64", "product": { "name": "kernel-source-3.0.101-65.1.ia64", "product_id": "kernel-source-3.0.101-65.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-65.1.ia64", "product": { "name": "kernel-syms-3.0.101-65.1.ia64", "product_id": "kernel-syms-3.0.101-65.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-65.1.ia64", "product": { "name": "kernel-trace-3.0.101-65.1.ia64", "product_id": "kernel-trace-3.0.101-65.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-65.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-65.1.ia64", "product_id": "kernel-trace-base-3.0.101-65.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-65.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-65.1.ia64", "product_id": "kernel-trace-devel-3.0.101-65.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-65.3.noarch", "product": { "name": "kernel-docs-3.0.101-65.3.noarch", "product_id": "kernel-docs-3.0.101-65.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-65.1.ppc64", "product": { "name": "kernel-default-3.0.101-65.1.ppc64", "product_id": "kernel-default-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-65.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-65.1.ppc64", "product_id": "kernel-default-base-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-65.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-65.1.ppc64", "product_id": "kernel-default-devel-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-65.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-65.1.ppc64", "product_id": "kernel-ppc64-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-65.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-65.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-65.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-65.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-65.1.ppc64", "product": { "name": "kernel-source-3.0.101-65.1.ppc64", "product_id": "kernel-source-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-65.1.ppc64", "product": { "name": "kernel-syms-3.0.101-65.1.ppc64", "product_id": "kernel-syms-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-65.1.ppc64", "product": { "name": "kernel-trace-3.0.101-65.1.ppc64", "product_id": "kernel-trace-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-65.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-65.1.ppc64", "product_id": "kernel-trace-base-3.0.101-65.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-65.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-65.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-65.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-65.1.s390x", "product": { "name": "kernel-default-3.0.101-65.1.s390x", "product_id": "kernel-default-3.0.101-65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-65.1.s390x", "product": { "name": "kernel-default-base-3.0.101-65.1.s390x", "product_id": "kernel-default-base-3.0.101-65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-65.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-65.1.s390x", "product_id": "kernel-default-devel-3.0.101-65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-65.1.s390x", "product": { "name": "kernel-default-man-3.0.101-65.1.s390x", "product_id": "kernel-default-man-3.0.101-65.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-65.1.s390x", "product": { "name": "kernel-source-3.0.101-65.1.s390x", "product_id": "kernel-source-3.0.101-65.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-65.1.s390x", "product": { "name": "kernel-syms-3.0.101-65.1.s390x", "product_id": "kernel-syms-3.0.101-65.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-65.1.s390x", "product": { "name": "kernel-trace-3.0.101-65.1.s390x", "product_id": "kernel-trace-3.0.101-65.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-65.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-65.1.s390x", "product_id": "kernel-trace-base-3.0.101-65.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-65.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-65.1.s390x", "product_id": "kernel-trace-devel-3.0.101-65.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-65.1.x86_64", "product": { "name": "kernel-default-3.0.101-65.1.x86_64", "product_id": "kernel-default-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-65.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-65.1.x86_64", "product_id": "kernel-default-base-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-65.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-65.1.x86_64", "product_id": "kernel-default-devel-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-65.1.x86_64", "product": { "name": "kernel-default-extra-3.0.101-65.1.x86_64", "product_id": "kernel-default-extra-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-65.1.x86_64", "product": { "name": "kernel-source-3.0.101-65.1.x86_64", "product_id": "kernel-source-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-65.1.x86_64", "product": { "name": "kernel-syms-3.0.101-65.1.x86_64", "product_id": "kernel-syms-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-65.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-65.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-65.1.x86_64", "product": { "name": "kernel-xen-3.0.101-65.1.x86_64", "product_id": "kernel-xen-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-65.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-65.1.x86_64", "product_id": "kernel-xen-base-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-65.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-65.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-65.1.x86_64", "product": { "name": "kernel-xen-extra-3.0.101-65.1.x86_64", "product_id": "kernel-xen-extra-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-65.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-65.1.x86_64", "product_id": "kernel-ec2-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-65.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-65.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-65.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-65.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-65.1.x86_64", "product": { "name": "kernel-trace-3.0.101-65.1.x86_64", "product_id": "kernel-trace-3.0.101-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-65.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-65.1.x86_64", "product_id": "kernel-trace-base-3.0.101-65.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-65.3.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" }, "product_reference": "kernel-docs-3.0.101-65.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586" }, "product_reference": "kernel-default-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586" }, "product_reference": "kernel-default-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586" }, "product_reference": "kernel-default-extra-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-extra-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-extra-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-extra-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586" }, "product_reference": "kernel-source-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64" }, "product_reference": "kernel-source-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586" }, "product_reference": "kernel-syms-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-extra-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-extra-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586" }, "product_reference": "kernel-default-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64" }, "product_reference": "kernel-default-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64" }, "product_reference": "kernel-default-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x" }, "product_reference": "kernel-default-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586" }, "product_reference": "kernel-default-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586" }, "product_reference": "kernel-ec2-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586" }, "product_reference": "kernel-source-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64" }, "product_reference": "kernel-source-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64" }, "product_reference": "kernel-source-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x" }, "product_reference": "kernel-source-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64" }, "product_reference": "kernel-source-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586" }, "product_reference": "kernel-syms-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64" }, "product_reference": "kernel-syms-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x" }, "product_reference": "kernel-syms-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586" }, "product_reference": "kernel-trace-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64" }, "product_reference": "kernel-trace-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x" }, "product_reference": "kernel-trace-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586" }, "product_reference": "kernel-default-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64" }, "product_reference": "kernel-default-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64" }, "product_reference": "kernel-default-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x" }, "product_reference": "kernel-default-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586" }, "product_reference": "kernel-default-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586" }, "product_reference": "kernel-ec2-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586" }, "product_reference": "kernel-source-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64" }, "product_reference": "kernel-source-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64" }, "product_reference": "kernel-source-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x" }, "product_reference": "kernel-source-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64" }, "product_reference": "kernel-source-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586" }, "product_reference": "kernel-syms-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64" }, "product_reference": "kernel-syms-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x" }, "product_reference": "kernel-syms-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586" }, "product_reference": "kernel-trace-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64" }, "product_reference": "kernel-trace-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x" }, "product_reference": "kernel-trace-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-65.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-65.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9728" } ], "notes": [ { "category": "general", "text": "The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9728", "url": "https://www.suse.com/security/cve/CVE-2014-9728" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9728", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933904 for CVE-2014-9728", "url": "https://bugzilla.suse.com/933904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "low" } ], "title": "CVE-2014-9728" }, { "cve": "CVE-2014-9729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9729" } ], "notes": [ { "category": "general", "text": "The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9729", "url": "https://www.suse.com/security/cve/CVE-2014-9729" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9729", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933904 for CVE-2014-9729", "url": "https://bugzilla.suse.com/933904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "low" } ], "title": "CVE-2014-9729" }, { "cve": "CVE-2014-9730", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9730" } ], "notes": [ { "category": "general", "text": "The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9730", "url": "https://www.suse.com/security/cve/CVE-2014-9730" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9730", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933904 for CVE-2014-9730", "url": "https://bugzilla.suse.com/933904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "low" } ], "title": "CVE-2014-9730" }, { "cve": "CVE-2014-9731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9731" } ], "notes": [ { "category": "general", "text": "The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target\u0027s name along with a trailing \\0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9731", "url": "https://www.suse.com/security/cve/CVE-2014-9731" }, { "category": "external", "summary": "SUSE Bug 911325 for CVE-2014-9731", "url": "https://bugzilla.suse.com/911325" }, { "category": "external", "summary": "SUSE Bug 933896 for CVE-2014-9731", "url": "https://bugzilla.suse.com/933896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "moderate" } ], "title": "CVE-2014-9731" }, { "cve": "CVE-2015-0777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0777" } ], "notes": [ { "category": "general", "text": "drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0777", "url": "https://www.suse.com/security/cve/CVE-2015-0777" }, { "category": "external", "summary": "SUSE Bug 917830 for CVE-2015-0777", "url": "https://bugzilla.suse.com/917830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "low" } ], "title": "CVE-2015-0777" }, { "cve": "CVE-2015-1420", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1420" } ], "notes": [ { "category": "general", "text": "Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1420", "url": "https://www.suse.com/security/cve/CVE-2015-1420" }, { "category": "external", "summary": "SUSE Bug 915517 for CVE-2015-1420", "url": "https://bugzilla.suse.com/915517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "moderate" } ], "title": "CVE-2015-1420" }, { "cve": "CVE-2015-1805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1805" } ], "notes": [ { "category": "general", "text": "The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an \"I/O vector array overrun.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1805", "url": "https://www.suse.com/security/cve/CVE-2015-1805" }, { "category": "external", "summary": "SUSE Bug 917839 for CVE-2015-1805", "url": "https://bugzilla.suse.com/917839" }, { "category": "external", "summary": "SUSE Bug 933429 for CVE-2015-1805", "url": "https://bugzilla.suse.com/933429" }, { "category": "external", "summary": "SUSE Bug 939270 for CVE-2015-1805", "url": "https://bugzilla.suse.com/939270" }, { "category": "external", "summary": "SUSE Bug 964730 for CVE-2015-1805", "url": "https://bugzilla.suse.com/964730" }, { "category": "external", "summary": "SUSE Bug 964732 for CVE-2015-1805", "url": "https://bugzilla.suse.com/964732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "important" } ], "title": "CVE-2015-1805" }, { "cve": "CVE-2015-2150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2150" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2150", "url": "https://www.suse.com/security/cve/CVE-2015-2150" }, { "category": "external", "summary": "SUSE Bug 800280 for CVE-2015-2150", "url": "https://bugzilla.suse.com/800280" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2150", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 919463 for CVE-2015-2150", "url": "https://bugzilla.suse.com/919463" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "moderate" } ], "title": "CVE-2015-2150" }, { "cve": "CVE-2015-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2830" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2830", "url": "https://www.suse.com/security/cve/CVE-2015-2830" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2830", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 926240 for CVE-2015-2830", "url": "https://bugzilla.suse.com/926240" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "moderate" } ], "title": "CVE-2015-2830" }, { "cve": "CVE-2015-4167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4167" } ], "notes": [ { "category": "general", "text": "The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4167", "url": "https://www.suse.com/security/cve/CVE-2015-4167" }, { "category": "external", "summary": "SUSE Bug 917839 for CVE-2015-4167", "url": "https://bugzilla.suse.com/917839" }, { "category": "external", "summary": "SUSE Bug 933907 for CVE-2015-4167", "url": "https://bugzilla.suse.com/933907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "moderate" } ], "title": "CVE-2015-4167" }, { "cve": "CVE-2015-4700", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4700" } ], "notes": [ { "category": "general", "text": "The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4700", "url": "https://www.suse.com/security/cve/CVE-2015-4700" }, { "category": "external", "summary": "SUSE Bug 935705 for CVE-2015-4700", "url": "https://bugzilla.suse.com/935705" }, { "category": "external", "summary": "SUSE Bug 939273 for CVE-2015-4700", "url": "https://bugzilla.suse.com/939273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "moderate" } ], "title": "CVE-2015-4700" }, { "cve": "CVE-2015-5364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5364" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5364", "url": "https://www.suse.com/security/cve/CVE-2015-5364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5364", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5364", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5364", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5364", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5364", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "moderate" } ], "title": "CVE-2015-5364" }, { "cve": "CVE-2015-5366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5366" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5366", "url": "https://www.suse.com/security/cve/CVE-2015-5366" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5366", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5366", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5366", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5366", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "moderate" } ], "title": "CVE-2015-5366" }, { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-6252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6252" } ], "notes": [ { "category": "general", "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6252", "url": "https://www.suse.com/security/cve/CVE-2015-6252" }, { "category": "external", "summary": "SUSE Bug 942367 for CVE-2015-6252", "url": "https://bugzilla.suse.com/942367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-65.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-09-08T16:29:34Z", "details": "low" } ], "title": "CVE-2015-6252" } ] }
suse-su-2015:2087-1
Vulnerability from csaf_suse
Published
2015-11-24 14:48
Modified
2015-11-24 14:48
Summary
Security update for Linux Kernel Live Patch 6
Notes
Title of the patch
Security update for Linux Kernel Live Patch 6
Description of the patch
This kernel live patch for Linux Kernel 3.12.44-52.10.1 fixes two security issues:
- CVE-2015-7613: A race condition in the IPC object implementation in
the Linux kernel allowed local users to gain privileges by triggering an
ipc_addid call that leads to uid and gid comparisons against uninitialized
data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)
- CVE-2015-5707: Integer overflow in the sg_start_req function in
drivers/scsi/sg.c in the Linux kernel allowed local users to cause a
denial of service or possibly have unspecified other impact via a large
iov_count value in a write request. (bsc#940342 bsc#940338)
Patchnames
SUSE-SLE-Live-Patching-12-2015-888
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 6", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.44-52.10.1 fixes two security issues:\n\n- CVE-2015-7613: A race condition in the IPC object implementation in\n the Linux kernel allowed local users to gain privileges by triggering an\n ipc_addid call that leads to uid and gid comparisons against uninitialized\n data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)\n- CVE-2015-5707: Integer overflow in the sg_start_req function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to cause a\n denial of service or possibly have unspecified other impact via a large\n iov_count value in a write request. (bsc#940342 bsc#940338)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2015-888", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2087-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2087-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152087-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2087-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-November/001695.html" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 948536", "url": "https://bugzilla.suse.com/948536" }, { "category": "self", "summary": "SUSE Bug 948701", "url": "https://bugzilla.suse.com/948701" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7613 page", "url": "https://www.suse.com/security/cve/CVE-2015-7613/" } ], "title": "Security update for Linux Kernel Live Patch 6", "tracking": { "current_release_date": "2015-11-24T14:48:39Z", "generator": { "date": "2015-11-24T14:48:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2087-1", "initial_release_date": "2015-11-24T14:48:39Z", "revision_history": [ { "date": "2015-11-24T14:48:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:48:39Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-7613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7613" } ], "notes": [ { "category": "general", "text": "Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7613", "url": "https://www.suse.com/security/cve/CVE-2015-7613" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-7613", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 948536 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948536" }, { "category": "external", "summary": "SUSE Bug 948701 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948701" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-7613", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:48:39Z", "details": "important" } ], "title": "CVE-2015-7613" } ] }
suse-su-2015:2167-1
Vulnerability from csaf_suse
Published
2015-12-02 10:32
Modified
2015-12-02 10:32
Summary
Security update for kernel-source-rt
Notes
Title of the patch
Security update for kernel-source-rt
Description of the patch
The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to version
3.0.101.rt130-45.1 to receive various security and bugfixes.
Following security bugs were fixed:
* CVE-2015-6252: Possible file descriptor leak for each
VHOST_SET_LOG_FDcommand issued, this could eventually wasting available
system resources and creating a denial of service (bsc#942367).
* CVE-2015-5707: Possible integer overflow in the calculation of total
number of pages in bio_map_user_iov() (bsc#940338).
* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
the Linux kernel before 4.0.6 do not properly consider yielding a
processor, which allowed remote attackers to cause a denial of service
(system hang) via incorrect checksums within a UDP packet flood
(bnc#936831).
* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return
values, which allowed remote attackers to cause a denial of service
(EPOLLET epoll application read outage) via an incorrect checksum in a
UDP packet, a different vulnerability than CVE-2015-5364 (bnc#936831).
* CVE-2015-1420: Race condition in the handle_to_path function in
fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to
bypass intended size restrictions and trigger read operations on
additional memory locations by changing the handle_bytes value of a
file handle during the execution of this function (bnc#915517).
* CVE-2015-4700: The bpf_int_jit_compile function in
arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed
local users to cause a denial of service (system crash) by creating a
packet filter and then loading crafted BPF instructions that trigger
late convergence by the JIT compiler (bnc#935705).
* CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the
Linux kernel before 4.1.6 does not initialize a certain bitmap data
structure, which allows local users to obtain sensitive information
from kernel memory via a GET_BITMAP_FILE ioctl call. (bnc#939994)
The following non-security bugs were fixed:
- Btrfs: be aware of btree inode write errors to avoid fs corruption
(bnc#942350).
- Btrfs: be aware of btree inode write errors to avoid fs corruption
(bnc#942404).
- Btrfs: check if previous transaction aborted to avoid fs corruption
(bnc#942350).
- Btrfs: check if previous transaction aborted to avoid fs corruption
(bnc#942404).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption
(bnc#942350).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption
(bnc#942404).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- Btrfs: fix memory corruption on failure to submit bio for direct IO
(bnc#942688).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in
encoders (v2) (bsc#942938).
- DRM/i915: Get rid if the 'hotplug_supported_mask' in struct
drm_i915_private (bsc#942938).
- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).
- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- CIFS: Fix missing crypto allocation (bnc#937402).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level
(bsc#923002).
- SCSI: Moved iscsi kabi patch to patches.kabi (bsc#923002)
- SCSI: kabi: allow iscsi disocvery session support (bsc#923002).
- SCSI: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- SCSI: fix scsi_error_handler vs. scsi_host_dev_release race
(bnc#942204).
- SCSI: scsi_error: add missing case statements in
scsi_decide_disposition() (bsc#920733).
- SCSI: scsi_transport_iscsi: Exporting new attrs for iscsi session and
connection in sysfs (bsc#923002).
- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).
- NFSv4: Minor cleanups for nfs4_handle_exception and
nfs4_async_handle_error (bsc#939910).
- New patches: patches.fixes/hrtimer-Prevent-timer-interrupt-DoS.patch
- PCI: Disable Bus Master only on kexec reboot (bsc#920110).
- PCI: Disable Bus Master unconditionally in pci_device_shutdown()
(bsc#920110).
- PCI: Do not try to disable Bus Master on disconnected PCI devices
(bsc#920110).
- PCI: Lock down register access when trusted_kernel is true (bnc#884333,
bsc#923431).
- PCI: disable Bus Master on PCI device shutdown (bsc#920110).
- Set hostbyte status in scsi_check_sense() (bsc#920733).
- USB: xhci: Reset a halted endpoint immediately when we encounter a
stall (bnc#933721).
- USB: xhci: do not start a halted endpoint before its new dequeue is set
(bnc#933721).
- apparmor: fix file_permission if profile is updated (bsc#917968).
- drm/cirrus: do not attempt to acquire a reservation while in an
interrupt handler (bsc#935572).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4)
(bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events
(v3) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2)
(bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt
(bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3)
(bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch
platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities
(bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access
(bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually
(bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set
(bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD
event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is
false (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler()
(bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets
(bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable
(bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting
(bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup
(bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock
(bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq
(bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler
(bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler
(bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/
(bsc#942938).
- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- exec: kill the unnecessary mm->def_flags setting in
load_elf_binary() (bnc#891116).
- ext3: Fix data corruption in inodes with journalled data (bsc#936637).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm->pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES
(bnc#930092).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).
- ibmveth: Add GRO support (bsc#935055).
- ibmveth: Add support for Large Receive Offload (bsc#935055).
- ibmveth: Add support for TSO (bsc#935055).
- ibmveth: add support for TSO6.
- ibmveth: change rx buffer default allocation for CMO (bsc#935055).
- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned
(bsc#927355).
- kabi: patches.fixes/mm-make-page-pfmemalloc-check-more-robust.patch
(bnc#920016).
- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change
(bsc920110).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477,
LTC#129509).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs
(bsc#923002).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM
Performance).
- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).
- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).
- mm, thp: only collapse hugepages to nodes with affinity for
zone_reclaim_mode (VM Functionality, bnc#931620).
- mm, thp: really limit transparent hugepage allocation to local node (VM
Performance, bnc#931620).
- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM
Performance, bnc#931620).
- mm/hugetlb: check for pte NULL pointer in __page_check_address()
(bnc#929143).
- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM
Performance, bnc#931620).
- mm/thp: allocate transparent hugepages on local node (VM Performance,
bnc#931620).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- mm: thp: khugepaged: add policy for finding target node (VM
Functionality, bnc#931620).
- net/mlx4_core: Do not disable SRIOV if there are active VFs
(bsc#927355).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference
(bsc#867362).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support
(bsc#932350).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: export debugging counters via /proc/vmstat
(bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to
guest (bsc#927355).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp()
(bsc#936095).
- r8169: remember WOL preferences on driver load (bsc#942305).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966,
LTC#128595).
- sg_start_req(): make sure that there's not too many elements in iovec
(bsc#940338).
- st: null pointer dereference panic caused by use after kref_put by
st_open (bsc#936875).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub
port reset (bnc#937641).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb
(bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver
(bnc#933721).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86-64: Do not apply destructive erratum workaround on unaffected CPUs
(bsc#929076).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/tsc: Change Fast TSC calibration failed from error to info
(bnc#942605).
- xfs: fix problem when using md+XFS under high load (bnc#925705).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256
(bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as
COMP_STOP_INVAL (bnc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
- xhci: do not report PLC when link is in internal resume state
(bnc#933721).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921,
LTC#126491).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925,
LTC#126491).
Patchnames
slertesp4-kernel-rt-20150914-12238
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-source-rt", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to version\n3.0.101.rt130-45.1 to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n* CVE-2015-6252: Possible file descriptor leak for each\n VHOST_SET_LOG_FDcommand issued, this could eventually wasting available\n system resources and creating a denial of service (bsc#942367).\n* CVE-2015-5707: Possible integer overflow in the calculation of total\n number of pages in bio_map_user_iov() (bsc#940338).\n* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in\n the Linux kernel before 4.0.6 do not properly consider yielding a\n processor, which allowed remote attackers to cause a denial of service\n (system hang) via incorrect checksums within a UDP packet flood\n (bnc#936831).\n* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in\n the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return\n values, which allowed remote attackers to cause a denial of service\n (EPOLLET epoll application read outage) via an incorrect checksum in a\n UDP packet, a different vulnerability than CVE-2015-5364 (bnc#936831).\n* CVE-2015-1420: Race condition in the handle_to_path function in\n fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to\n bypass intended size restrictions and trigger read operations on\n additional memory locations by changing the handle_bytes value of a\n file handle during the execution of this function (bnc#915517).\n* CVE-2015-4700: The bpf_int_jit_compile function in\n arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed\n local users to cause a denial of service (system crash) by creating a\n packet filter and then loading crafted BPF instructions that trigger\n late convergence by the JIT compiler (bnc#935705).\n* CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the\n Linux kernel before 4.1.6 does not initialize a certain bitmap data\n structure, which allows local users to obtain sensitive information\n from kernel memory via a GET_BITMAP_FILE ioctl call. (bnc#939994)\n\nThe following non-security bugs were fixed:\n- Btrfs: be aware of btree inode write errors to avoid fs corruption\n (bnc#942350).\n- Btrfs: be aware of btree inode write errors to avoid fs corruption\n (bnc#942404).\n- Btrfs: check if previous transaction aborted to avoid fs corruption\n (bnc#942350).\n- Btrfs: check if previous transaction aborted to avoid fs corruption\n (bnc#942404).\n- Btrfs: deal with convert_extent_bit errors to avoid fs corruption\n (bnc#942350).\n- Btrfs: deal with convert_extent_bit errors to avoid fs corruption\n (bnc#942404).\n- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).\n- Btrfs: fix memory corruption on failure to submit bio for direct IO\n (bnc#942688).\n- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).\n- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).\n- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in\n encoders (v2) (bsc#942938).\n- DRM/i915: Get rid if the \u0027hotplug_supported_mask\u0027 in struct\n drm_i915_private (bsc#942938).\n- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).\n- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).\n- CIFS: Fix missing crypto allocation (bnc#937402).\n- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).\n- IB/iser: Add Discovery support (bsc#923002).\n- IB/iser: Move informational messages from error to info level\n (bsc#923002).\n- SCSI: Moved iscsi kabi patch to patches.kabi (bsc#923002)\n- SCSI: kabi: allow iscsi disocvery session support (bsc#923002).\n- SCSI: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).\n- SCSI: fix scsi_error_handler vs. scsi_host_dev_release race\n (bnc#942204).\n- SCSI: scsi_error: add missing case statements in\n scsi_decide_disposition() (bsc#920733).\n- SCSI: scsi_transport_iscsi: Exporting new attrs for iscsi session and\n connection in sysfs (bsc#923002).\n- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).\n- NFSv4: Minor cleanups for nfs4_handle_exception and\n nfs4_async_handle_error (bsc#939910).\n- New patches: patches.fixes/hrtimer-Prevent-timer-interrupt-DoS.patch\n- PCI: Disable Bus Master only on kexec reboot (bsc#920110).\n- PCI: Disable Bus Master unconditionally in pci_device_shutdown()\n (bsc#920110).\n- PCI: Do not try to disable Bus Master on disconnected PCI devices\n (bsc#920110).\n- PCI: Lock down register access when trusted_kernel is true (bnc#884333,\n bsc#923431).\n- PCI: disable Bus Master on PCI device shutdown (bsc#920110).\n- Set hostbyte status in scsi_check_sense() (bsc#920733).\n- USB: xhci: Reset a halted endpoint immediately when we encounter a\n stall (bnc#933721).\n- USB: xhci: do not start a halted endpoint before its new dequeue is set\n (bnc#933721).\n- apparmor: fix file_permission if profile is updated (bsc#917968).\n- drm/cirrus: do not attempt to acquire a reservation while in an\n interrupt handler (bsc#935572).\n- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).\n- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).\n- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4)\n (bsc#942938).\n- drm/i915: Add bit field to record which pins have received HPD events\n (v3) (bsc#942938).\n- drm/i915: Add messages useful for HPD storm detection debugging (v2)\n (bsc#942938).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt\n (bsc#942938).\n- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3)\n (bsc#942938).\n- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch\n platforms (bsc#942938).\n- drm/i915: Enable hotplug interrupts after querying hw capabilities\n (bsc#942938).\n- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).\n- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).\n- drm/i915: Make hpd arrays big enough to avoid out of bounds access\n (bsc#942938).\n- drm/i915: Mask out the HPD irq bits before setting them individually\n (bsc#942938).\n- drm/i915: Only print hotplug event message when hotplug bit is set\n (bsc#942938).\n- drm/i915: Only reprobe display on encoder which has received an HPD\n event (v2) (bsc#942938).\n- drm/i915: Queue reenable timer also when enable_hotplug_processing is\n false (bsc#942938).\n- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).\n- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler()\n (bsc#942938).\n- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets\n (bsc#942938).\n- drm/i915: assert_spin_locked for pipestat interrupt enable/disable\n (bsc#942938).\n- drm/i915: clear crt hotplug compare voltage field before setting\n (bsc#942938).\n- drm/i915: close tiny race in the ilk pcu even interrupt setup\n (bsc#942938).\n- drm/i915: fix hotplug event bit tracking (bsc#942938).\n- drm/i915: fix hpd interrupt register locking (bsc#942938).\n- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock\n (bsc#942938).\n- drm/i915: fix locking around ironlake_enable|disable_display_irq\n (bsc#942938).\n- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler\n (bsc#942938).\n- drm/i915: fold the no-irq check into intel_hpd_irq_handler\n (bsc#942938).\n- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).\n- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/\n (bsc#942938).\n- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).\n- ehci-pci: enable interrupt on BayTrail (bnc926007).\n- exec: kill the unnecessary mm-\u0026gt;def_flags setting in\n load_elf_binary() (bnc#891116).\n- ext3: Fix data corruption in inodes with journalled data (bsc#936637).\n- fanotify: Fix deadlock with permission events (bsc#935053).\n- fork: reset mm-\u0026gt;pinned_vm (bnc#937855).\n- hrtimer: prevent timer interrupt DoS (bnc#886785).\n- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES\n (bnc#930092).\n- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).\n- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).\n- ibmveth: Add GRO support (bsc#935055).\n- ibmveth: Add support for Large Receive Offload (bsc#935055).\n- ibmveth: Add support for TSO (bsc#935055).\n- ibmveth: add support for TSO6.\n- ibmveth: change rx buffer default allocation for CMO (bsc#935055).\n- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).\n- inotify: Fix nested sleeps in inotify_read() (bsc#940925).\n- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).\n- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).\n- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).\n- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned\n (bsc#927355).\n- kabi: patches.fixes/mm-make-page-pfmemalloc-check-more-robust.patch\n (bnc#920016).\n- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change\n (bsc920110).\n- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).\n- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477,\n LTC#129509).\n- libiscsi: Exporting new attrs for iscsi session and connection in sysfs\n (bsc#923002).\n- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).\n- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).\n- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).\n- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM\n Performance).\n- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).\n- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).\n- mm, thp: only collapse hugepages to nodes with affinity for\n zone_reclaim_mode (VM Functionality, bnc#931620).\n- mm, thp: really limit transparent hugepage allocation to local node (VM\n Performance, bnc#931620).\n- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM\n Performance, bnc#931620).\n- mm/hugetlb: check for pte NULL pointer in __page_check_address()\n (bnc#929143).\n- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM\n Performance, bnc#931620).\n- mm/thp: allocate transparent hugepages on local node (VM Performance,\n bnc#931620).\n- mm: make page pfmemalloc check more robust (bnc#920016).\n- mm: restrict access to slab files under procfs and sysfs (bnc#936077).\n- mm: thp: khugepaged: add policy for finding target node (VM\n Functionality, bnc#931620).\n- net/mlx4_core: Do not disable SRIOV if there are active VFs\n (bsc#927355).\n- net: Fix \u0027ip rule delete table 256\u0027 (bsc#873385).\n- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference\n (bsc#867362).\n- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).\n- netfilter: nf_conntrack_proto_sctp: minimal multihoming support\n (bsc#932350).\n- nfsd: support disabling 64bit dir cookies (bnc#937503).\n- pagecache limit: Do not skip over small zones that easily (bnc#925881).\n- pagecache limit: add tracepoints (bnc#924701).\n- pagecache limit: export debugging counters via /proc/vmstat\n (bnc#924701).\n- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).\n- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).\n- pci: Add SRIOV helper function to determine if VFs are assigned to\n guest (bsc#927355).\n- pci: Add flag indicating device has been assigned by KVM (bnc#777565).\n- pci: Add flag indicating device has been assigned by KVM (bnc#777565).\n- perf, nmi: Fix unknown NMI warning (bsc#929142).\n- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).\n- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp()\n (bsc#936095).\n- r8169: remember WOL preferences on driver load (bsc#942305).\n- s390/dasd: fix kernel panic when alias is set offline (bnc#940966,\n LTC#128595).\n- sg_start_req(): make sure that there\u0027s not too many elements in iovec\n (bsc#940338).\n- st: null pointer dereference panic caused by use after kref_put by\n st_open (bsc#936875).\n- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub\n port reset (bnc#937641).\n- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb\n (bnc#933721).\n- usb: xhci: handle Config Error Change (CEC) in xhci driver\n (bnc#933721).\n- vmxnet3: Bump up driver version number (bsc#936423).\n- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).\n- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).\n- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).\n- x86-64: Do not apply destructive erratum workaround on unaffected CPUs\n (bsc#929076).\n- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).\n- x86/tsc: Change Fast TSC calibration failed from error to info\n (bnc#942605).\n- xfs: fix problem when using md+XFS under high load (bnc#925705).\n- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).\n- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).\n- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256\n (bnc#933721).\n- xhci: Treat not finding the event_seg on COMP_STOP the same as\n COMP_STOP_INVAL (bnc#933721).\n- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).\n- xhci: do not report PLC when link is in internal resume state\n (bnc#933721).\n- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).\n- xhci: report U3 when link is in resume state (bnc#933721).\n- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).\n- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921,\n LTC#126491).\n- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925,\n LTC#126491).", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-rt-20150914-12238", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2167-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2167-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152167-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2167-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" }, { "category": "self", "summary": "SUSE Bug 777565", "url": "https://bugzilla.suse.com/777565" }, { "category": "self", "summary": "SUSE Bug 867362", "url": "https://bugzilla.suse.com/867362" }, { "category": "self", "summary": "SUSE Bug 873385", "url": "https://bugzilla.suse.com/873385" }, { "category": "self", "summary": "SUSE Bug 883380", "url": "https://bugzilla.suse.com/883380" }, { "category": "self", "summary": "SUSE Bug 884333", "url": "https://bugzilla.suse.com/884333" }, { "category": "self", "summary": "SUSE Bug 886785", "url": "https://bugzilla.suse.com/886785" }, { "category": "self", "summary": "SUSE Bug 891116", "url": "https://bugzilla.suse.com/891116" }, { "category": "self", "summary": "SUSE Bug 894936", "url": "https://bugzilla.suse.com/894936" }, { "category": "self", "summary": "SUSE Bug 915517", "url": "https://bugzilla.suse.com/915517" }, { "category": "self", "summary": "SUSE Bug 917968", "url": "https://bugzilla.suse.com/917968" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 920110", "url": "https://bugzilla.suse.com/920110" }, { "category": "self", "summary": "SUSE Bug 920733", "url": "https://bugzilla.suse.com/920733" }, { "category": "self", "summary": "SUSE Bug 923002", "url": "https://bugzilla.suse.com/923002" }, { "category": "self", "summary": "SUSE Bug 923431", "url": "https://bugzilla.suse.com/923431" }, { "category": "self", "summary": "SUSE Bug 924701", "url": "https://bugzilla.suse.com/924701" }, { "category": "self", "summary": "SUSE Bug 925705", "url": "https://bugzilla.suse.com/925705" }, { "category": "self", "summary": "SUSE Bug 925881", "url": "https://bugzilla.suse.com/925881" }, { "category": "self", "summary": "SUSE Bug 925903", "url": "https://bugzilla.suse.com/925903" }, { "category": "self", "summary": "SUSE Bug 927355", "url": "https://bugzilla.suse.com/927355" }, { "category": "self", "summary": "SUSE Bug 929076", "url": "https://bugzilla.suse.com/929076" }, { "category": "self", "summary": "SUSE Bug 929142", "url": "https://bugzilla.suse.com/929142" }, { "category": "self", "summary": "SUSE Bug 929143", "url": "https://bugzilla.suse.com/929143" }, { "category": "self", "summary": "SUSE Bug 930092", "url": "https://bugzilla.suse.com/930092" }, { "category": "self", "summary": "SUSE Bug 930934", "url": "https://bugzilla.suse.com/930934" }, { "category": "self", "summary": "SUSE Bug 931620", "url": "https://bugzilla.suse.com/931620" }, { "category": "self", "summary": "SUSE Bug 932350", "url": "https://bugzilla.suse.com/932350" }, { "category": "self", "summary": "SUSE Bug 933721", "url": "https://bugzilla.suse.com/933721" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935055", "url": "https://bugzilla.suse.com/935055" }, { "category": "self", "summary": "SUSE Bug 935572", "url": "https://bugzilla.suse.com/935572" }, { "category": "self", "summary": "SUSE Bug 935705", "url": "https://bugzilla.suse.com/935705" }, { "category": "self", "summary": "SUSE Bug 935866", "url": "https://bugzilla.suse.com/935866" }, { "category": "self", "summary": "SUSE Bug 935906", "url": "https://bugzilla.suse.com/935906" }, { "category": "self", "summary": "SUSE Bug 936077", "url": "https://bugzilla.suse.com/936077" }, { "category": "self", "summary": "SUSE Bug 936095", "url": "https://bugzilla.suse.com/936095" }, { "category": "self", "summary": "SUSE Bug 936118", "url": "https://bugzilla.suse.com/936118" }, { "category": "self", "summary": "SUSE Bug 936423", "url": "https://bugzilla.suse.com/936423" }, { "category": "self", "summary": "SUSE Bug 936637", "url": "https://bugzilla.suse.com/936637" }, { "category": "self", "summary": "SUSE Bug 936831", "url": "https://bugzilla.suse.com/936831" }, { "category": "self", "summary": "SUSE Bug 936875", "url": "https://bugzilla.suse.com/936875" }, { "category": "self", "summary": "SUSE Bug 936921", "url": "https://bugzilla.suse.com/936921" }, { "category": "self", "summary": "SUSE Bug 936925", "url": "https://bugzilla.suse.com/936925" }, { "category": "self", "summary": "SUSE Bug 937032", "url": "https://bugzilla.suse.com/937032" }, { "category": "self", "summary": "SUSE Bug 937256", "url": "https://bugzilla.suse.com/937256" }, { "category": "self", "summary": "SUSE Bug 937402", "url": "https://bugzilla.suse.com/937402" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 937503", "url": "https://bugzilla.suse.com/937503" }, { "category": "self", "summary": "SUSE Bug 937641", "url": "https://bugzilla.suse.com/937641" }, { "category": "self", "summary": "SUSE Bug 937855", "url": "https://bugzilla.suse.com/937855" }, { "category": "self", "summary": "SUSE Bug 938485", "url": "https://bugzilla.suse.com/938485" }, { "category": "self", "summary": "SUSE Bug 939910", "url": "https://bugzilla.suse.com/939910" }, { "category": "self", "summary": "SUSE Bug 939994", "url": "https://bugzilla.suse.com/939994" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940398", "url": "https://bugzilla.suse.com/940398" }, { "category": "self", "summary": "SUSE Bug 940925", "url": "https://bugzilla.suse.com/940925" }, { "category": "self", "summary": "SUSE Bug 940966", "url": "https://bugzilla.suse.com/940966" }, { "category": "self", "summary": "SUSE Bug 942204", "url": "https://bugzilla.suse.com/942204" }, { "category": "self", "summary": "SUSE Bug 942305", "url": "https://bugzilla.suse.com/942305" }, { "category": "self", "summary": "SUSE Bug 942350", "url": "https://bugzilla.suse.com/942350" }, { "category": "self", "summary": "SUSE Bug 942367", "url": "https://bugzilla.suse.com/942367" }, { "category": "self", "summary": "SUSE Bug 942404", "url": "https://bugzilla.suse.com/942404" }, { "category": "self", "summary": "SUSE Bug 942605", "url": "https://bugzilla.suse.com/942605" }, { "category": "self", "summary": "SUSE Bug 942688", "url": "https://bugzilla.suse.com/942688" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943477", "url": "https://bugzilla.suse.com/943477" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1420 page", "url": "https://www.suse.com/security/cve/CVE-2015-1420/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4700 page", "url": "https://www.suse.com/security/cve/CVE-2015-4700/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5364 page", "url": "https://www.suse.com/security/cve/CVE-2015-5364/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5366 page", "url": "https://www.suse.com/security/cve/CVE-2015-5366/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5697 page", "url": "https://www.suse.com/security/cve/CVE-2015-5697/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6252 page", "url": "https://www.suse.com/security/cve/CVE-2015-6252/" } ], "title": "Security update for kernel-source-rt", "tracking": { "current_release_date": "2015-12-02T10:32:42Z", "generator": { "date": "2015-12-02T10:32:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2167-1", "initial_release_date": "2015-12-02T10:32:42Z", "revision_history": [ { "date": "2015-12-02T10:32:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-45.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-45.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-45.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-45.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-45.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-45.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-45.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-45.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-45.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1420", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1420" } ], "notes": [ { "category": "general", "text": "Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1420", "url": "https://www.suse.com/security/cve/CVE-2015-1420" }, { "category": "external", "summary": "SUSE Bug 915517 for CVE-2015-1420", "url": "https://bugzilla.suse.com/915517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-02T10:32:42Z", "details": "moderate" } ], "title": "CVE-2015-1420" }, { "cve": "CVE-2015-4700", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4700" } ], "notes": [ { "category": "general", "text": "The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4700", "url": "https://www.suse.com/security/cve/CVE-2015-4700" }, { "category": "external", "summary": "SUSE Bug 935705 for CVE-2015-4700", "url": "https://bugzilla.suse.com/935705" }, { "category": "external", "summary": "SUSE Bug 939273 for CVE-2015-4700", "url": "https://bugzilla.suse.com/939273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-02T10:32:42Z", "details": "moderate" } ], "title": "CVE-2015-4700" }, { "cve": "CVE-2015-5364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5364" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5364", "url": "https://www.suse.com/security/cve/CVE-2015-5364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5364", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5364", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5364", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5364", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5364", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-02T10:32:42Z", "details": "moderate" } ], "title": "CVE-2015-5364" }, { "cve": "CVE-2015-5366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5366" } ], "notes": [ { "category": "general", "text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5366", "url": "https://www.suse.com/security/cve/CVE-2015-5366" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-5366", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 936831 for CVE-2015-5366", "url": "https://bugzilla.suse.com/936831" }, { "category": "external", "summary": "SUSE Bug 939276 for CVE-2015-5366", "url": "https://bugzilla.suse.com/939276" }, { "category": "external", "summary": "SUSE Bug 945112 for CVE-2015-5366", "url": "https://bugzilla.suse.com/945112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-02T10:32:42Z", "details": "moderate" } ], "title": "CVE-2015-5366" }, { "cve": "CVE-2015-5697", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5697" } ], "notes": [ { "category": "general", "text": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5697", "url": "https://www.suse.com/security/cve/CVE-2015-5697" }, { "category": "external", "summary": "SUSE Bug 939994 for CVE-2015-5697", "url": "https://bugzilla.suse.com/939994" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5697", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-02T10:32:42Z", "details": "low" } ], "title": "CVE-2015-5697" }, { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-02T10:32:42Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-6252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6252" } ], "notes": [ { "category": "general", "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6252", "url": "https://www.suse.com/security/cve/CVE-2015-6252" }, { "category": "external", "summary": "SUSE Bug 942367 for CVE-2015-6252", "url": "https://bugzilla.suse.com/942367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-02T10:32:42Z", "details": "low" } ], "title": "CVE-2015-6252" } ] }
suse-su-2015:2090-1
Vulnerability from csaf_suse
Published
2015-11-24 14:47
Modified
2015-11-24 14:47
Summary
Security update for Linux Kernel Live Patch 3
Notes
Title of the patch
Security update for Linux Kernel Live Patch 3
Description of the patch
This kernel live patch for Linux Kernel 3.12.38-44.1 fixes two security issues:
- CVE-2015-7613: A race condition in the IPC object implementation in
the Linux kernel allowed local users to gain privileges by triggering an
ipc_addid call that leads to uid and gid comparisons against uninitialized
data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)
- CVE-2015-5707: Integer overflow in the sg_start_req function in
drivers/scsi/sg.c in the Linux kernel allowed local users to cause a
denial of service or possibly have unspecified other impact via a large
iov_count value in a write request. (bsc#940342 bsc#940338)
Patchnames
SUSE-SLE-Live-Patching-12-2015-885
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 3", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.38-44.1 fixes two security issues:\n\n- CVE-2015-7613: A race condition in the IPC object implementation in\n the Linux kernel allowed local users to gain privileges by triggering an\n ipc_addid call that leads to uid and gid comparisons against uninitialized\n data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)\n- CVE-2015-5707: Integer overflow in the sg_start_req function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to cause a\n denial of service or possibly have unspecified other impact via a large\n iov_count value in a write request. (bsc#940342 bsc#940338)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2015-885", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2090-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2090-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152090-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2090-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-November/001698.html" }, { "category": "self", "summary": "SUSE Bug 940338", "url": "https://bugzilla.suse.com/940338" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 948536", "url": "https://bugzilla.suse.com/948536" }, { "category": "self", "summary": "SUSE Bug 948701", "url": "https://bugzilla.suse.com/948701" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5707 page", "url": "https://www.suse.com/security/cve/CVE-2015-5707/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7613 page", "url": "https://www.suse.com/security/cve/CVE-2015-7613/" } ], "title": "Security update for Linux Kernel Live Patch 3", "tracking": { "current_release_date": "2015-11-24T14:47:59Z", "generator": { "date": "2015-11-24T14:47:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2090-1", "initial_release_date": "2015-11-24T14:47:59Z", "revision_history": [ { "date": "2015-11-24T14:47:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_38-44-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_38-44-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_38-44-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_38-44-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_38-44-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_38-44-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_38-44-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_38-44-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_38-44-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_38-44-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5707" } ], "notes": [ { "category": "general", "text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5707", "url": "https://www.suse.com/security/cve/CVE-2015-5707" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-5707", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 940338 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940338" }, { "category": "external", "summary": "SUSE Bug 940342 for CVE-2015-5707", "url": "https://bugzilla.suse.com/940342" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5707", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:47:59Z", "details": "moderate" } ], "title": "CVE-2015-5707" }, { "cve": "CVE-2015-7613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7613" } ], "notes": [ { "category": "general", "text": "Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7613", "url": "https://www.suse.com/security/cve/CVE-2015-7613" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-7613", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 948536 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948536" }, { "category": "external", "summary": "SUSE Bug 948701 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948701" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-7613", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-11-24T14:47:59Z", "details": "important" } ], "title": "CVE-2015-7613" } ] }
fkie_cve-2015-5707
Vulnerability from fkie_nvd
Published
2015-10-19 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81 | Patch, Vendor Advisory | |
cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee | Patch, Vendor Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.debian.org/security/2015/dsa-3329 | Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/08/01/6 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/76145 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1033521 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2733-1 | Third Party Advisory | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2734-1 | Third Party Advisory | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2737-1 | Third Party Advisory | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2738-1 | Third Party Advisory | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2750-1 | Third Party Advisory | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2759-1 | Third Party Advisory | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2760-1 | Third Party Advisory | |
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1250030 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81 | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee | Patch, Third Party Advisory | |
cve@mitre.org | https://source.android.com/security/bulletin/2017-07-01 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3329 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/08/01/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/76145 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033521 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2733-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2734-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2737-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2738-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2750-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2759-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2760-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1250030 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2017-07-01 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.04 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
suse | suse_linux_enterprise_desktop | 11 | |
suse | suse_linux_enterprise_server | 11 | |
suse | suse_linux_enterprise_server | 11 | |
suse | suse_linux_enterprise_server | 11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4884A404-34BE-4D52-B749-219701AF2BC2", "versionEndExcluding": "4.1.0", "versionStartIncluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "F4BC592E-17CC-4DD4-8B2C-CFD99383649C", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "matchCriteriaId": "C202F75B-221A-40BB-8A0D-451335B39937", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "DD4BBD63-E038-45CE-9537-D96831E99A06", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "matchCriteriaId": "0EA03350-8702-43D5-8605-5FB765A3F60B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request." }, { "lang": "es", "value": "Desbordamiento de entero en la funci\u00f3n sg_start_req en drivers/scsi/sg.c en el kernel de Linux 2.6.x hasta la versi\u00f3n 4.x en versiones anteriores a 4.1 permite a usuarios locales provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de un valor iov_count grande en una petici\u00f3n de escritura." } ], "id": "CVE-2015-5707", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-19T10:59:05.037", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3329" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/01/6" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76145" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033521" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2733-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2734-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2737-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2738-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2750-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2759-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2760-1" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2017-07-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/01/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2733-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2734-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2737-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2738-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2750-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2759-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2760-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2017-07-01" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2015-5707
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-5707", "description": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "id": "GSD-2015-5707", "references": [ "https://www.suse.com/security/cve/CVE-2015-5707.html", "https://www.debian.org/security/2015/dsa-3329", "https://ubuntu.com/security/CVE-2015-5707", "https://advisories.mageia.org/CVE-2015-5707.html", "https://linux.oracle.com/cve/CVE-2015-5707.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-5707" ], "details": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "id": "GSD-2015-5707", "modified": "2023-12-13T01:20:06.230960Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2738-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2738-1" }, { "name": "SUSE-SU-2015:2089", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" }, { "name": "USN-2733-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2733-1" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "name": "SUSE-SU-2015:2087", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" }, { "name": "USN-2750-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2750-1" }, { "name": "USN-2737-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2737-1" }, { "name": "https://source.android.com/security/bulletin/2017-07-01", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2017-07-01" }, { "name": "SUSE-SU-2015:1611", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" }, { "name": "DSA-3329", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3329" }, { "name": "1033521", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033521" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030" }, { "name": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "USN-2760-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2760-1" }, { "name": "SUSE-SU-2015:2091", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" }, { "name": "SUSE-SU-2015:1478", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" }, { "name": "USN-2759-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2759-1" }, { "name": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "SUSE-SU-2015:2084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" }, { "name": "SUSE-SU-2015:2085", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" }, { "name": "USN-2734-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2734-1" }, { "name": "[oss-security] 20150801 CVE request: Integer overflow in SCSI generic driver in Linux \u003c4.1", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/01/6" }, { "name": "SUSE-SU-2015:2086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" }, { "name": "SUSE-SU-2015:1592", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" }, { "name": "SUSE-SU-2015:2090", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" }, { "name": "76145", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76145" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.0", "versionStartIncluding": "2.6.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5707" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "name": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "name": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "[oss-security] 20150801 CVE request: Integer overflow in SCSI generic driver in Linux \u003c4.1", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/01/6" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "name": "76145", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76145" }, { "name": "SUSE-SU-2015:2087", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" }, { "name": "SUSE-SU-2015:2086", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" }, { "name": "SUSE-SU-2015:2091", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" }, { "name": "SUSE-SU-2015:2090", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" }, { "name": "SUSE-SU-2015:2089", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" }, { "name": "SUSE-SU-2015:2084", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" }, { "name": "SUSE-SU-2015:2085", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" }, { "name": "SUSE-SU-2015:1611", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" }, { "name": "USN-2760-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2760-1" }, { "name": "USN-2759-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2759-1" }, { "name": "SUSE-SU-2015:1592", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" }, { "name": "USN-2734-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2734-1" }, { "name": "USN-2737-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2737-1" }, { "name": "USN-2733-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2733-1" }, { "name": "USN-2738-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2738-1" }, { "name": "USN-2750-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2750-1" }, { "name": "DSA-3329", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3329" }, { "name": "SUSE-SU-2015:1478", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" }, { "name": "https://source.android.com/security/bulletin/2017-07-01", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2017-07-01" }, { "name": "1033521", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033521" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2020-06-02T14:57Z", "publishedDate": "2015-10-19T10:59Z" } } }
ghsa-rfcp-m7v6-h4ff
Vulnerability from github
Published
2022-05-13 01:26
Modified
2022-05-13 01:26
VLAI Severity ?
Details
Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
{ "affected": [], "aliases": [ "CVE-2015-5707" ], "database_specific": { "cwe_ids": [ "CWE-190" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-10-19T10:59:00Z", "severity": "MODERATE" }, "details": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.", "id": "GHSA-rfcp-m7v6-h4ff", "modified": "2022-05-13T01:26:11Z", "published": "2022-05-13T01:26:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5707" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1250030" }, { "type": "WEB", "url": "https://source.android.com/security/bulletin/2017-07-01" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3329" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2015/08/01/6" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/76145" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1033521" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2733-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2734-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2737-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2738-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2750-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2759-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2760-1" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…