Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-6937 (GCVE-0-2015-6937)
Vulnerability from cvelistv5
Published
2015-10-19 10:00
Modified
2024-08-06 07:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:36:35.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2016:0337", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2015:2350", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "name": "SUSE-SU-2016:0434", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "DSA-3364", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3364" }, { "name": "FEDORA-2015-16440", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html" }, { "name": "SUSE-SU-2015:1727", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139" }, { "name": "1034453", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034453" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "openSUSE-SU-2015:2232", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "SUSE-SU-2016:0380", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "name": "SUSE-SU-2016:0354", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2016:0335", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "SUSE-SU-2015:2339", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "SUSE-SU-2015:2108", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "[oss-security] 20150914 CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/09/14/3" }, { "name": "USN-2774-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2774-1" }, { "name": "SUSE-SU-2016:0383", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "FEDORA-2015-16417", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html" }, { "name": "76767", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76767" }, { "name": "USN-2773-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2773-1" }, { "name": "SUSE-SU-2016:0386", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "name": "FEDORA-2015-16441", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "SUSE-SU-2016:2074", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "SUSE-SU-2016:0384", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "SUSE-SU-2016:0387", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "USN-2777-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2777-1" }, { "name": "SUSE-SU-2016:0381", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SU-2016:0337", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2015:2350", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "name": "SUSE-SU-2016:0434", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "DSA-3364", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3364" }, { "name": "FEDORA-2015-16440", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html" }, { "name": "SUSE-SU-2015:1727", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139" }, { "name": "1034453", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034453" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "openSUSE-SU-2015:2232", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "SUSE-SU-2016:0380", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "name": "SUSE-SU-2016:0354", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2016:0335", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "SUSE-SU-2015:2339", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "SUSE-SU-2015:2108", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "[oss-security] 20150914 CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/09/14/3" }, { "name": "USN-2774-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2774-1" }, { "name": "SUSE-SU-2016:0383", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "FEDORA-2015-16417", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html" }, { "name": "76767", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76767" }, { "name": "USN-2773-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2773-1" }, { "name": "SUSE-SU-2016:0386", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "name": "FEDORA-2015-16441", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "SUSE-SU-2016:2074", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "SUSE-SU-2016:0384", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "SUSE-SU-2016:0387", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "USN-2777-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2777-1" }, { "name": "SUSE-SU-2016:0381", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2016:0337", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2015:2350", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "name": "SUSE-SU-2016:0434", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "DSA-3364", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3364" }, { "name": "FEDORA-2015-16440", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html" }, { "name": "SUSE-SU-2015:1727", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139" }, { "name": "1034453", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034453" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "openSUSE-SU-2015:2232", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "SUSE-SU-2016:0380", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "name": "SUSE-SU-2016:0354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2016:0335", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "SUSE-SU-2015:2339", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "SUSE-SU-2015:2108", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "[oss-security] 20150914 CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/09/14/3" }, { "name": "USN-2774-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2774-1" }, { "name": "SUSE-SU-2016:0383", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "name": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "FEDORA-2015-16417", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html" }, { "name": "76767", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76767" }, { "name": "USN-2773-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2773-1" }, { "name": "SUSE-SU-2016:0386", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "name": "FEDORA-2015-16441", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "SUSE-SU-2016:2074", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "SUSE-SU-2016:0384", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "SUSE-SU-2016:0387", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "USN-2777-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2777-1" }, { "name": "SUSE-SU-2016:0381", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6937", "datePublished": "2015-10-19T10:00:00", "dateReserved": "2015-09-14T00:00:00", "dateUpdated": "2024-08-06T07:36:35.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-6937\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-10-19T10:59:07.380\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n __rds_conn_create en net/rds/connection.c en el kernel de Linux hasta la versi\u00f3n 4.2.3 permite a usuarios locales provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda del sistema) o posiblemente tener otro impacto no especificado mediante el uso de un socket que no estaba vinculado adecuadamente.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.2.3\",\"matchCriteriaId\":\"2F1B9081-FA4D-426C-B2DE-78AEA0BB6DB1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3364\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/09/14/3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/76767\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034453\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2773-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2774-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2777-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1263139\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3364\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/09/14/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/76767\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2773-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2774-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2777-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1263139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}],\"evaluatorComment\":\"\u003ca href=\\\"http://cwe.mitre.org/data/definitions/476.html\\\" rel=\\\"nofollow\\\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e\"}}" } }
suse-su-2016:0386-1
Vulnerability from csaf_suse
Published
2016-02-08 13:46
Modified
2016-02-08 13:46
Summary
Security update for kernel live patch 6
Notes
Title of the patch
Security update for kernel live patch 6
Description of the patch
This kernel live patch for Linux Kernel 3.12.44-52.10.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-222
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 6", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.44-52.10.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-222", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0386-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0386-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160386-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0386-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001860.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 6", "tracking": { "current_release_date": "2016-02-08T13:46:05Z", "generator": { "date": "2016-02-08T13:46:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0386-1", "initial_release_date": "2016-02-08T13:46:05Z", "revision_history": [ { "date": "2016-02-08T13:46:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0434-1
Vulnerability from csaf_suse
Published
2016-02-11 16:46
Modified
2016-02-11 16:46
Summary
Security update for kernel live patch 1
Notes
Title of the patch
Security update for kernel live patch 1
Description of the patch
This kernel live patch for Linux Kernel 3.12.32-33.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-249
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 1", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.32-33.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-249", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0434-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0434-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160434-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0434-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001875.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 1", "tracking": { "current_release_date": "2016-02-11T16:46:47Z", "generator": { "date": "2016-02-11T16:46:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0434-1", "initial_release_date": "2016-02-11T16:46:47Z", "revision_history": [ { "date": "2016-02-11T16:46:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0337-1
Vulnerability from csaf_suse
Published
2016-02-04 15:01
Modified
2016-02-04 15:01
Summary
Security update for kernel live patch 8
Notes
Title of the patch
Security update for kernel live patch 8
Description of the patch
This kernel live patch for Linux Kernel 3.12.48-52.27.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-206
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 8", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.48-52.27.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-206", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0337-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0337-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160337-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0337-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001845.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 8", "tracking": { "current_release_date": "2016-02-04T15:01:47Z", "generator": { "date": "2016-02-04T15:01:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0337-1", "initial_release_date": "2016-02-04T15:01:47Z", "revision_history": [ { "date": "2016-02-04T15:01:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0387-1
Vulnerability from csaf_suse
Published
2016-02-08 13:46
Modified
2016-02-08 13:46
Summary
Security update for kernel live patch 7
Notes
Title of the patch
Security update for kernel live patch 7
Description of the patch
This kernel live patch for Linux Kernel 3.12.44-52.18.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-223
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 7", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.44-52.18.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-223", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0387-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0387-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160387-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0387-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001861.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 7", "tracking": { "current_release_date": "2016-02-08T13:46:12Z", "generator": { "date": "2016-02-08T13:46:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0387-1", "initial_release_date": "2016-02-08T13:46:12Z", "revision_history": [ { "date": "2016-02-08T13:46:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2015:2350-1
Vulnerability from csaf_suse
Published
2015-12-23 13:24
Modified
2015-12-23 13:24
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-7509: Mounting a prepared ext2 filesystem as ext4 could lead
to a local denial of service (crash) (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
the Linux kernel did not ensure that certain slot numbers are valid,
which allowed local users to cause a denial of service (NULL pointer
dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call
(bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (host OS panic or hang) by triggering
many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (host OS panic or hang) by triggering
many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c
(bnc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on
the x86_64 platform mishandled IRET faults in processing NMIs that
occurred during userspace execution, which might allow local users to
gain privileges by triggering an NMI (bnc#937969 937970 938706 939207).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
in the Linux kernel allowed local users to cause a denial of service
(OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
kernel did not validate attempted changes to the MTU value, which allowed
context-dependent attackers to cause a denial of service (packet loss)
via a value that is (1) smaller than the minimum compliant value or
(2) larger than the MTU of an interface, as demonstrated by a Router
Advertisement (RA) message that is not validated by a daemon, a different
vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is
limited to the NetworkManager product. (bnc#955354).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c
in the Linux kernel allowed local users to cause a denial of service
(NULL pointer dereference and system crash) or possibly have unspecified
other impact by using a socket that was not properly bound (bnc#945825).
The following non-security bugs were fixed:
- af_xhci: avoid path quiesce of severed path in shutdown() (bnc#946214, LTC#131684).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- drivers: hv: do not do hypercalls when hypercall_page is NULL.
- drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- drivers: hv: vmbus: add special crash handler (bnc#930770).
- drivers: hv: vmbus: add special kexec handler.
- drivers: hv: vmbus: Get rid of some unused definitions.
- drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- drivers: hv: vmbus: kill tasklets on module unload.
- drivers: hv: vmbus: prefer 'die' notification chain to 'panic'.
- drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- drivers: hv: vmbus: unregister panic notifier on module unload.
- driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- Import SP4-RT GA kabi files
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: drop first packet to dead server (bsc#946078).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214, LTC#130124).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214, LTC#132100).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950, VM Functionality).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).
- mm: remove GFP_THISNODE (bsc#954950, VM Functionality).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS (fate#304949)).
- Modified -rt patches: 343 of 434, noise elided.
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pci: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- pci: delay configuration of SRIOV capability (bnc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bnc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214, LTC#132707).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214, LTC#132706).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).
- s390/pci: handle events for unused functions (bnc#946214, LTC#130628).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214, LTC#130628).
- s390/pci: improve state check when processing hotplug events (bnc#946214, LTC#130628).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- sg: fix read() error reporting (bsc#926774).
- sunrpc: refactor rpcauth_checkverf error returns (bsc#955673).
- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
Patchnames
slertesp4-kernel-rt-20151204-12284
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-7509: Mounting a prepared ext2 filesystem as ext4 could lead\n to a local denial of service (crash) (bsc#956709).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in\n the Linux kernel did not ensure that certain slot numbers are valid,\n which allowed local users to cause a denial of service (NULL pointer\n dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call\n (bnc#949936).\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS\n users to cause a denial of service (host OS panic or hang) by triggering\n many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS\n users to cause a denial of service (host OS panic or hang) by triggering\n many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c\n (bnc#953527).\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#952384).\n- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on\n the x86_64 platform mishandled IRET faults in processing NMIs that\n occurred during userspace execution, which might allow local users to\n gain privileges by triggering an NMI (bnc#937969 937970 938706 939207).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c\n in the Linux kernel allowed local users to cause a denial of service\n (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux\n kernel did not validate attempted changes to the MTU value, which allowed\n context-dependent attackers to cause a denial of service (packet loss)\n via a value that is (1) smaller than the minimum compliant value or\n (2) larger than the MTU of an interface, as demonstrated by a Router\n Advertisement (RA) message that is not validated by a daemon, a different\n vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is\n limited to the NetworkManager product. (bnc#955354).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c\n in the Linux kernel allowed local users to cause a denial of service\n (NULL pointer dereference and system crash) or possibly have unspecified\n other impact by using a socket that was not properly bound (bnc#945825).\n\nThe following non-security bugs were fixed:\n- af_xhci: avoid path quiesce of severed path in shutdown() (bnc#946214, LTC#131684).\n- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).\n- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).\n- blktap: refine mm tracking (bsc#952976).\n- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- dm-snap: avoid deadock on s-\u0026gt;lock when a read is split (bsc#939826).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- drivers: hv: do not do hypercalls when hypercall_page is NULL.\n- drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.\n- drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.\n- drivers: hv: vmbus: add special crash handler (bnc#930770).\n- drivers: hv: vmbus: add special kexec handler.\n- drivers: hv: vmbus: Get rid of some unused definitions.\n- drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.\n- drivers: hv: vmbus: kill tasklets on module unload.\n- drivers: hv: vmbus: prefer \u0027die\u0027 notification chain to \u0027panic\u0027.\n- drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().\n- drivers: hv: vmbus: unregister panic notifier on module unload.\n- driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).\n- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).\n- fix lpfc_send_rscn_event allocation size claims bnc#935757\n- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).\n- fs: Fix deadlocks between sync and fs freezing (bsc#935123).\n- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).\n- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).\n- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).\n- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).\n- Import SP4-RT GA kabi files\n- ipr: Fix incorrect trace indexing (bsc#940913).\n- ipr: Fix invalid array indexing for HRRQ (bsc#940913).\n- ipv6: fix tunnel error handling (bsc#952579).\n- ipvs: drop first packet to dead server (bsc#946078).\n- ipvs: Fix reuse connection if real server is dead (bnc#945827).\n- kernel: correct uc_sigmask of the compat signal frame (bnc#946214, LTC#130124).\n- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214, LTC#132100).\n- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).\n- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).\n- ktime: add ktime_after and ktime_before helpe (bsc#904348).\n- lib/string.c: introduce memchr_inv() (bnc#930788).\n- lpfc: Fix cq_id masking problem (bsc#944677).\n- macvlan: Support bonding events bsc#948521\n- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).\n- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).\n- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).\n- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).\n- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).\n- mm: fix GFP_THISNODE callers and clarify (bsc#954950, VM Functionality).\n- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).\n- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).\n- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).\n- mm: remove GFP_THISNODE (bsc#954950, VM Functionality).\n- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS (fate#304949)).\n- Modified -rt patches: 343 of 434, noise elided.\n- net/core: Add VF link state control policy (bsc#950298).\n- netfilter: xt_recent: fix namespace destroy path (bsc#879378).\n- NFSv4: Fix two infinite loops in the mount code (bsc#954628).\n- panic/x86: Allow cpus to save registers even if they (bnc#940946).\n- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).\n- pci: Add dev_flags bit to access VPD through function 0 (bnc#943786).\n- pci: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).\n- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).\n- pci: delay configuration of SRIOV capability (bnc#952084).\n- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).\n- pci: set pci sriov page size before reading SRIOV BAR (bnc#952084).\n- pci: Update NumVFs register when disabling SR-IOV (bnc#952084).\n- pktgen: clean up ktime_t helpers (bsc#904348).\n- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).\n- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).\n- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).\n- qla2xxx: Remove unavailable firmware files (bsc#921081).\n- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).\n- quota: Fix deadlock with suspend and quotas (bsc#935123).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).\n- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).\n- rtnetlink: Fix VF IFLA policy (bsc#950298).\n- rtnetlink: fix VF info size (bsc#950298).\n- s390/dasd: fix disconnected device with valid path mask (bnc#946214, LTC#132707).\n- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214, LTC#132706).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).\n- s390/pci: handle events for unused functions (bnc#946214, LTC#130628).\n- s390/pci: improve handling of hotplug event 0x301 (bnc#946214, LTC#130628).\n- s390/pci: improve state check when processing hotplug events (bnc#946214, LTC#130628).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- scsi: hosts: update to use ida_simple for host_no (bsc#939926)\n- sg: fix read() error reporting (bsc#926774).\n- sunrpc: refactor rpcauth_checkverf error returns (bsc#955673).\n- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.\n- usbback: correct copy length for partial transfers (bsc#941202).\n- usbvision fix overflow of interfaces array (bnc#950998).\n- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).\n- veth: extend device features (bsc#879381).\n- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).\n- vmxnet3: adjust ring sizes when interface is down (bsc#950750).\n- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).\n- writeback: Skip writeback for frozen filesystem (bsc#935123).\n- x86/evtchn: make use of PHYSDEVOP_map_pirq.\n- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).\n- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).\n- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).\n- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).\n- xfs: add background scanning to clear eofblocks inodes (bnc#930788).\n- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).\n- xfs: add inode id filtering to eofblocks scan (bnc#930788).\n- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).\n- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).\n- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).\n- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).\n- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).\n- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).\n- xfs: support a tag-based inode_ag_iterator (bnc#930788).\n- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).\n- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).\n- xhci: Calculate old endpoints correctly on device reset (bnc#944831).\n- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).\n- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).\n- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).\n- xhci: silence TD warning (bnc#939955).\n- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-rt-20151204-12284", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2350-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2350-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152350-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2350-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 879378", "url": "https://bugzilla.suse.com/879378" }, { "category": "self", "summary": "SUSE Bug 879381", "url": "https://bugzilla.suse.com/879381" }, { "category": "self", "summary": "SUSE Bug 900610", "url": "https://bugzilla.suse.com/900610" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 904965", "url": "https://bugzilla.suse.com/904965" }, { "category": "self", "summary": "SUSE Bug 921081", "url": "https://bugzilla.suse.com/921081" }, { "category": "self", "summary": "SUSE Bug 926709", "url": "https://bugzilla.suse.com/926709" }, { "category": "self", "summary": "SUSE Bug 926774", "url": "https://bugzilla.suse.com/926774" }, { "category": "self", "summary": "SUSE Bug 930145", "url": "https://bugzilla.suse.com/930145" }, { "category": "self", "summary": "SUSE Bug 930770", "url": "https://bugzilla.suse.com/930770" }, { "category": "self", "summary": "SUSE Bug 930788", "url": "https://bugzilla.suse.com/930788" }, { "category": "self", "summary": "SUSE Bug 930835", "url": "https://bugzilla.suse.com/930835" }, { "category": "self", "summary": "SUSE Bug 932805", "url": "https://bugzilla.suse.com/932805" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935123", "url": "https://bugzilla.suse.com/935123" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 937256", "url": "https://bugzilla.suse.com/937256" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 937969", "url": "https://bugzilla.suse.com/937969" }, { "category": "self", "summary": "SUSE Bug 937970", "url": "https://bugzilla.suse.com/937970" }, { "category": "self", "summary": "SUSE Bug 938706", "url": "https://bugzilla.suse.com/938706" }, { "category": "self", "summary": "SUSE Bug 939207", "url": "https://bugzilla.suse.com/939207" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 939955", "url": "https://bugzilla.suse.com/939955" }, { "category": "self", "summary": "SUSE Bug 940017", "url": "https://bugzilla.suse.com/940017" }, { "category": "self", "summary": "SUSE Bug 940913", "url": "https://bugzilla.suse.com/940913" }, { "category": "self", "summary": "SUSE Bug 940946", "url": "https://bugzilla.suse.com/940946" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 944677", "url": "https://bugzilla.suse.com/944677" }, { "category": "self", "summary": "SUSE Bug 944831", "url": "https://bugzilla.suse.com/944831" }, { "category": "self", "summary": "SUSE Bug 944837", "url": "https://bugzilla.suse.com/944837" }, { "category": "self", "summary": "SUSE Bug 944989", "url": "https://bugzilla.suse.com/944989" }, { "category": "self", "summary": "SUSE Bug 944993", "url": "https://bugzilla.suse.com/944993" }, { "category": "self", "summary": "SUSE Bug 945691", "url": "https://bugzilla.suse.com/945691" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 945827", "url": "https://bugzilla.suse.com/945827" }, { "category": "self", "summary": "SUSE Bug 946078", "url": "https://bugzilla.suse.com/946078" }, { "category": "self", "summary": "SUSE Bug 946214", "url": "https://bugzilla.suse.com/946214" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 947957", "url": "https://bugzilla.suse.com/947957" }, { "category": "self", "summary": "SUSE Bug 948330", "url": "https://bugzilla.suse.com/948330" }, { "category": "self", "summary": "SUSE Bug 948347", "url": "https://bugzilla.suse.com/948347" }, { "category": "self", "summary": "SUSE Bug 948521", "url": "https://bugzilla.suse.com/948521" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949298", "url": "https://bugzilla.suse.com/949298" }, { "category": "self", "summary": "SUSE Bug 949502", "url": "https://bugzilla.suse.com/949502" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949936", "url": "https://bugzilla.suse.com/949936" }, { "category": "self", "summary": "SUSE Bug 949981", "url": "https://bugzilla.suse.com/949981" }, { "category": "self", "summary": "SUSE Bug 950298", "url": "https://bugzilla.suse.com/950298" }, { "category": "self", "summary": "SUSE Bug 950750", "url": "https://bugzilla.suse.com/950750" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952084", "url": "https://bugzilla.suse.com/952084" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952579", "url": "https://bugzilla.suse.com/952579" }, { "category": "self", "summary": "SUSE Bug 952976", "url": "https://bugzilla.suse.com/952976" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 953799", "url": "https://bugzilla.suse.com/953799" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE Bug 954628", "url": "https://bugzilla.suse.com/954628" }, { "category": "self", "summary": "SUSE Bug 954950", "url": "https://bugzilla.suse.com/954950" }, { "category": "self", "summary": "SUSE Bug 954984", "url": "https://bugzilla.suse.com/954984" }, { "category": "self", "summary": "SUSE Bug 955354", "url": "https://bugzilla.suse.com/955354" }, { "category": "self", "summary": "SUSE Bug 955673", "url": "https://bugzilla.suse.com/955673" }, { "category": "self", "summary": "SUSE Bug 956709", "url": "https://bugzilla.suse.com/956709" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5157 page", "url": "https://www.suse.com/security/cve/CVE-2015-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7509 page", "url": "https://www.suse.com/security/cve/CVE-2015-7509/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-12-23T13:24:50Z", "generator": { "date": "2015-12-23T13:24:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2350-1", "initial_release_date": "2015-12-23T13:24:50Z", "revision_history": [ { "date": "2015-12-23T13:24:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5157" } ], "notes": [ { "category": "general", "text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5157", "url": "https://www.suse.com/security/cve/CVE-2015-5157" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 937969 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937969" }, { "category": "external", "summary": "SUSE Bug 937970 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937970" }, { "category": "external", "summary": "SUSE Bug 938706 for CVE-2015-5157", "url": "https://bugzilla.suse.com/938706" }, { "category": "external", "summary": "SUSE Bug 939207 for CVE-2015-5157", "url": "https://bugzilla.suse.com/939207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "important" } ], "title": "CVE-2015-5157" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7509" } ], "notes": [ { "category": "general", "text": "fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7509", "url": "https://www.suse.com/security/cve/CVE-2015-7509" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7509", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 956707 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956707" }, { "category": "external", "summary": "SUSE Bug 956709 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956709" }, { "category": "external", "summary": "SUSE Bug 956766 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "moderate" } ], "title": "CVE-2015-7509" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "critical" } ], "title": "CVE-2015-8104" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-8215" } ] }
suse-su-2015:1727-1
Vulnerability from csaf_suse
Published
2015-10-05 22:31
Modified
2015-10-05 22:31
Summary
Security update for kernel-source
Notes
Title of the patch
Security update for kernel-source
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to 3.12.48-52.27 to
receive various security and bugfixes.
Following security bugs were fixed:
* CVE-2015-7613: A flaw was found in the Linux kernel IPC code that could
lead to arbitrary code execution. The ipc_addid() function initialized
a shared object that has unset uid/gid values. Since the fields are not
initialized, the check can falsely succeed. (bsc#948536)
* CVE-2015-5156: When a guests KVM network devices is in a bridge
configuration the kernel can create a situation in which packets are
fragmented in an unexpected fashion. The GRO functionality can create
a situation in which multiple SKB's are chained together in a single
packets fraglist (by design). (bsc#940776)
* CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel before
4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs
that occurred during userspace execution, which might allow local
users to gain privileges by triggering an NMI (bsc#938706).
* CVE-2015-6252: A flaw was found in the way the Linux kernel's vhost
driver treated userspace provided log file descriptor when processing
the VHOST_SET_LOG_FD ioctl command. The file descriptor was never
released and continued to consume kernel memory. A privileged local
user with access to the /dev/vhost-net files could use this flaw to
create a denial-of-service attack (bsc#942367).
* CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the
Linux kernel before 4.1.6 does not initialize a certain bitmap data
structure, which allows local users to obtain sensitive information
from kernel memory via a GET_BITMAP_FILE ioctl call. (bnc#939994)
* CVE-2015-6937: A NULL pointer dereference flaw was found in the
Reliable Datagram Sockets (RDS) implementation allowing a local user to
cause system DoS. A verification was missing that the underlying
transport exists when a connection was created. (bsc#945825)
* CVE-2015-5283: A NULL pointer dereference flaw was found in SCTP
implementation allowing a local user to cause system DoS. Creation of
multiple sockets in parallel when system doesn't have SCTP module
loaded can lead to kernel panic. (bsc#947155)
The following non-security bugs were fixed:
- ALSA: hda - Abort the probe without i915 binding for HSW/BDW
(bsc#936556).
- Btrfs: Backport subvolume mount option handling (bsc#934962)
- Btrfs: Handle unaligned length in extent_same (bsc#937609).
- Btrfs: advertise which crc32c implementation is being used on mount
(bsc#946057).
- Btrfs: allow mounting btrfs subvolumes with different ro/rw options.
- Btrfs: check if previous transaction aborted to avoid fs corruption
(bnc#942509).
- Btrfs: clean up error handling in mount_subvol() (bsc#934962).
- Btrfs: cleanup orphans while looking up default subvolume (bsc#914818).
- Btrfs: do not update mtime/ctime on deduped inodes (bsc#937616).
- Btrfs: fail on mismatched subvol and subvolid mount options
(bsc#934962).
- Btrfs: fix chunk allocation regression leading to transaction abort
(bnc#938550).
- Btrfs: fix clone / extent-same deadlocks (bsc#937612).
- Btrfs: fix crash on close_ctree() if cleaner starts new transaction
(bnc#938891).
- Btrfs: fix deadlock with extent-same and readpage (bsc#937612).
- Btrfs: fix file corruption after cloning inline extents (bnc#942512).
- Btrfs: fix file read corruption after extent cloning and fsync
(bnc#946902).
- Btrfs: fix find_free_dev_extent() malfunction in case device tree has
hole (bnc#938550).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942685).
- Btrfs: fix list transaction->pending_ordered corruption
(bnc#938893).
- Btrfs: fix memory corruption on failure to submit bio for direct IO
(bnc#942685).
- Btrfs: fix memory leak in the extent_same ioctl (bsc#937613).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942685).
- Btrfs: fix race between balance and unused block group deletion
(bnc#938892).
- Btrfs: fix range cloning when same inode used as source and destination
(bnc#942511).
- Btrfs: fix read corruption of compressed and shared extents
(bnc#946906).
- Btrfs: fix uninit variable in clone ioctl (bnc#942511).
- Btrfs: fix use-after-free in mount_subvol().
- Btrfs: fix wrong check for btrfs_force_chunk_alloc() (bnc#938550).
- Btrfs: lock superblock before remounting for rw subvol (bsc#934962).
- Btrfs: pass unaligned length to btrfs_cmp_data() (bsc#937609).
- Btrfs: remove all subvol options before mounting top-level
(bsc#934962).
- Btrfs: show subvol= and subvolid= in /proc/mounts (bsc#934962).
- Btrfs: unify subvol= and subvolid= mounting (bsc#934962).
- Btrfs: fill ->last_trans for delayed inode in btrfs_fill_inode
(bnc#942925).
- Btrfs: fix metadata inconsistencies after directory fsync (bnc#942925).
- Btrfs: fix stale dir entries after removing a link and fsync
(bnc#942925).
- Btrfs: fix stale dir entries after unlink, inode eviction and fsync
(bnc#942925).
- Btrfs: fix stale directory entries after fsync log replay (bnc#942925).
- Btrfs: make btrfs_search_forward return with nodes unlocked
(bnc#942925).
- Btrfs: support NFSv2 export (bnc#929871).
- Btrfs: update fix for read corruption of compressed and shared extents
(bsc#948256).
- Drivers: hv: do not do hypercalls when hypercall_page is NULL.
- Drivers: hv: vmbus: add special crash handler.
- Drivers: hv: vmbus: add special kexec handler.
- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from
hv_synic_cleanup().
- Input: evdev - do not report errors form flush() (bsc#939834).
- Input: synaptics - do not retrieve the board id on old firmwares
(bsc#929092).
- Input: synaptics - log queried and quirked dimension values
(bsc#929092).
- Input: synaptics - query min dimensions for fw v8.1.
- Input: synaptics - remove X1 Carbon 3rd gen from the topbuttonpad list
(bsc#929092).
- Input: synaptics - remove X250 from the topbuttonpad list.
- Input: synaptics - remove obsolete min/max quirk for X240 (bsc#929092).
- Input: synaptics - skip quirks when post-2013 dimensions (bsc#929092).
- Input: synaptics - split synaptics_resolution(), query first
(bsc#929092).
- Input: synaptics - support min/max board id in min_max_pnpid_table
(bsc#929092).
- NFS: Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- NFSv4: do not set SETATTR for O_RDONLY|O_EXCL (bsc#939716).
- PCI: Move MPS configuration check to pci_configure_device()
(bsc#943313).
- PCI: Set MPS to match upstream bridge (bsc#943313).
- SCSI: fix regression in scsi_send_eh_cmnd() (bsc#930813).
- SCSI: fix scsi_error_handler vs. scsi_host_dev_release race
(bnc#942204).
- SCSI: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398).
- UAS: fixup for remaining use of dead_list (bnc#934942).
- USB: storage: use %*ph specifier to dump small buffers (bnc#934942).
- aio: fix reqs_available handling (bsc#943378).
- audit: do not generate loginuid log when audit disabled (bsc#941098).
- blk-merge: do not compute bi_phys_segments from bi_vcnt for cloned bio
(bnc#934430).
- blk-merge: fix blk_recount_segments (bnc#934430).
- blk-merge: recaculate segment if it isn't less than max segments
(bnc#934430).
- block: add queue flag for disabling SG merging (bnc#934430).
- block: blk-merge: fix blk_recount_segments() (bnc#934430).
- config: disable CONFIG_TCM_RBD on ppc64le and s390x
- cpufreq: intel_pstate: Add CPU ID for Braswell processor.
- dlm: fix missing endian conversion of rcom_status flags (bsc#940679).
- dm cache mq: fix memory allocation failure for large cache devices
(bsc#942707).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt
(bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access
(bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set
(bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is
false (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler()
(bsc#942938).
- drm/radeon: fix hotplug race at startup (bsc#942307).
- ethtool, net/mlx4_en: Add 100M, 20G, 56G speeds ethtool reporting
support (bsc#945710).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hv: fcopy: add memory barrier to propagate state (bnc#943529).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- intel_pstate: Add CPU IDs for Broadwell processors.
- intel_pstate: Add CPUID for BDW-H CPU.
- intel_pstate: Add support for SkyLake.
- intel_pstate: Correct BYT VID values (bnc#907973).
- intel_pstate: Remove periodic P state boost (bnc#907973).
- intel_pstate: add sample time scaling (bnc#907973, bnc#924722,
bnc#916543).
- intel_pstate: don't touch turbo bit if turbo disabled or unavailable
(bnc#907973).
- intel_pstate: remove setting P state to MAX on init (bnc#907973).
- intel_pstate: remove unneeded sample buffers (bnc#907973).
- intel_pstate: set BYT MSR with wrmsrl_on_cpu() (bnc#907973).
- ipr: Fix incorrect trace indexing (bsc#940912).
- ipr: Fix invalid array indexing for HRRQ (bsc#940912).
- iwlwifi: dvm: drop non VO frames when flushing (bsc#940545).
- kABI workaround for ieee80211_ops.flush argument change (bsc#940545).
- kconfig: Do not print status messages in make -s mode (bnc#942160).
- kernel/modsign_uefi.c: Check for EFI_RUNTIME_SERVICES in
load_uefi_certs (bsc#856382).
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943476,
LTC#129509).
- kexec: define kexec_in_progress in !CONFIG_KEXEC case.
- kvm: Use WARN_ON_ONCE for missing X86_FEATURE_NRIPS (bsc#947537).
- lpfc: Fix scsi prep dma buf error (bsc#908950).
- mac80211: add vif to flush call (bsc#940545).
- md/bitmap: do not abuse i_writecount for bitmap files (bsc#943270).
- md/bitmap: protect clearing of ->bitmap by mddev->lock
(bnc#912183).
- md/raid5: use ->lock to protect accessing raid5 sysfs attributes
(bnc#912183).
- md: fix problems with freeing private data after ->run failure
(bnc#912183).
- md: level_store: group all important changes into one place
(bnc#912183).
- md: move GET_BITMAP_FILE ioctl out from mddev_lock (bsc#943270).
- md: protect ->pers changes with mddev->lock (bnc#912183).
- md: remove mddev_lock from rdev_attr_show() (bnc#912183).
- md: remove mddev_lock() from md_attr_show() (bnc#912183).
- md: remove need for mddev_lock() in md_seq_show() (bnc#912183).
- md: split detach operation out from ->stop (bnc#912183).
- md: tidy up set_bitmap_file (bsc#943270).
- megaraid_sas: Handle firmware initialization after fast boot
(bsc#922071).
- mfd: lpc_ich: Assign subdevice ids automatically (bnc#898159).
- mm: filemap: Avoid unnecessary barriers and waitqueue lookups -fix
(VM/FS Performance (bnc#941951)).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: numa: disable change protection for vma(VM_HUGETLB) (bnc#943573).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support
(bsc#932350).
- net/mlx4_core: Add ethernet backplane autoneg device capability
(bsc#945710).
- net/mlx4_core: Introduce ACCESS_REG CMD and eth_prot_ctrl dev cap
(bsc#945710).
- net/mlx4_en: Use PTYS register to query ethtool settings (bsc#945710).
- net/mlx4_en: Use PTYS register to set ethtool settings (Speed)
(bsc#945710).
- rcu: Reject memory-order-induced stall-warning false positives
(bnc#941908).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940965,
LTC#128595).
- sched: Fix KMALLOC_MAX_SIZE overflow during cpumask allocation
(bnc#939266).
- sched: Fix cpu_active_mask/cpu_online_mask race (bsc#936773).
- sched, numa: do not hint for NUMA balancing on VM_MIXEDMAP mappings
(bnc#943573).
- uas: Add US_FL_MAX_SECTORS_240 flag (bnc#934942).
- uas: Add response iu handling (bnc#934942).
- uas: Add uas_get_tag() helper function (bnc#934942).
- uas: Check against unexpected completions (bnc#934942).
- uas: Cleanup uas_log_cmd_state usage (bnc#934942).
- uas: Do not log urb status error on cancellation (bnc#934942).
- uas: Do not use scsi_host_find_tag (bnc#934942).
- uas: Drop COMMAND_COMPLETED flag (bnc#934942).
- uas: Drop all references to a scsi_cmnd once it has been aborted
(bnc#934942).
- uas: Drop inflight list (bnc#934942).
- uas: Fix memleak of non-submitted urbs (bnc#934942).
- uas: Fix resetting flag handling (bnc#934942).
- uas: Free data urbs on completion (bnc#934942).
- uas: Log error codes when logging errors (bnc#934942).
- uas: Reduce number of function arguments for uas_alloc_foo functions
(bnc#934942).
- uas: Remove cmnd reference from the cmd urb (bnc#934942).
- uas: Remove support for old sense ui as used in pre-production hardware
(bnc#934942).
- uas: Remove task-management / abort error handling code (bnc#934942).
- uas: Set max_sectors_240 quirk for ASM1053 devices (bnc#934942).
- uas: Simplify reset / disconnect handling (bnc#934942).
- uas: Simplify unlink of data urbs on error (bnc#934942).
- uas: Use scsi_print_command (bnc#934942).
- uas: pre_reset and suspend: Fix a few races (bnc#934942).
- uas: zap_pending: data urbs should have completed at this time
(bnc#934942).
- x86/kernel: Do not reserve crashkernel high memory if crashkernel low
memory reserving failed (bsc#939145).
- x86/smpboot: Check for cpu_active on cpu initialization (bsc#932285).
- x86/smpboot: Check for cpu_active on cpu initialization (bsc#936773).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#944028).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#944028).
- xfs: Fix file type directory corruption for btree directories
(bsc#941305).
Patchnames
SUSE-SLE-DESKTOP-12-2015-668,SUSE-SLE-Live-Patching-12-2015-668,SUSE-SLE-Module-Public-Cloud-12-2015-668,SUSE-SLE-SDK-12-2015-668,SUSE-SLE-SERVER-12-2015-668,SUSE-SLE-WE-12-2015-668
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-source", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 kernel was updated to 3.12.48-52.27 to\nreceive various security and bugfixes.\n\nFollowing security bugs were fixed:\n* CVE-2015-7613: A flaw was found in the Linux kernel IPC code that could\n lead to arbitrary code execution. The ipc_addid() function initialized\n a shared object that has unset uid/gid values. Since the fields are not\n initialized, the check can falsely succeed. (bsc#948536)\n* CVE-2015-5156: When a guests KVM network devices is in a bridge\n configuration the kernel can create a situation in which packets are\n fragmented in an unexpected fashion. The GRO functionality can create\n a situation in which multiple SKB\u0027s are chained together in a single\n packets fraglist (by design). (bsc#940776)\n* CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel before\n 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs\n that occurred during userspace execution, which might allow local\n users to gain privileges by triggering an NMI (bsc#938706).\n* CVE-2015-6252: A flaw was found in the way the Linux kernel\u0027s vhost\n driver treated userspace provided log file descriptor when processing\n the VHOST_SET_LOG_FD ioctl command. The file descriptor was never\n released and continued to consume kernel memory. A privileged local\n user with access to the /dev/vhost-net files could use this flaw to\n create a denial-of-service attack (bsc#942367).\n* CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the\n Linux kernel before 4.1.6 does not initialize a certain bitmap data\n structure, which allows local users to obtain sensitive information\n from kernel memory via a GET_BITMAP_FILE ioctl call. (bnc#939994)\n* CVE-2015-6937: A NULL pointer dereference flaw was found in the\n Reliable Datagram Sockets (RDS) implementation allowing a local user to\n cause system DoS. A verification was missing that the underlying\n transport exists when a connection was created. (bsc#945825)\n* CVE-2015-5283: A NULL pointer dereference flaw was found in SCTP\n implementation allowing a local user to cause system DoS. Creation of\n multiple sockets in parallel when system doesn\u0027t have SCTP module\n loaded can lead to kernel panic. (bsc#947155)\n\nThe following non-security bugs were fixed:\n- ALSA: hda - Abort the probe without i915 binding for HSW/BDW\n (bsc#936556).\n- Btrfs: Backport subvolume mount option handling (bsc#934962)\n- Btrfs: Handle unaligned length in extent_same (bsc#937609).\n- Btrfs: advertise which crc32c implementation is being used on mount\n (bsc#946057).\n- Btrfs: allow mounting btrfs subvolumes with different ro/rw options.\n- Btrfs: check if previous transaction aborted to avoid fs corruption\n (bnc#942509).\n- Btrfs: clean up error handling in mount_subvol() (bsc#934962).\n- Btrfs: cleanup orphans while looking up default subvolume (bsc#914818).\n- Btrfs: do not update mtime/ctime on deduped inodes (bsc#937616).\n- Btrfs: fail on mismatched subvol and subvolid mount options\n (bsc#934962).\n- Btrfs: fix chunk allocation regression leading to transaction abort\n (bnc#938550).\n- Btrfs: fix clone / extent-same deadlocks (bsc#937612).\n- Btrfs: fix crash on close_ctree() if cleaner starts new transaction\n (bnc#938891).\n- Btrfs: fix deadlock with extent-same and readpage (bsc#937612).\n- Btrfs: fix file corruption after cloning inline extents (bnc#942512).\n- Btrfs: fix file read corruption after extent cloning and fsync\n (bnc#946902).\n- Btrfs: fix find_free_dev_extent() malfunction in case device tree has\n hole (bnc#938550).\n- Btrfs: fix hang when failing to submit bio of directIO (bnc#942685).\n- Btrfs: fix list transaction-\u0026gt;pending_ordered corruption\n (bnc#938893).\n- Btrfs: fix memory corruption on failure to submit bio for direct IO\n (bnc#942685).\n- Btrfs: fix memory leak in the extent_same ioctl (bsc#937613).\n- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942685).\n- Btrfs: fix race between balance and unused block group deletion\n (bnc#938892).\n- Btrfs: fix range cloning when same inode used as source and destination\n (bnc#942511).\n- Btrfs: fix read corruption of compressed and shared extents\n (bnc#946906).\n- Btrfs: fix uninit variable in clone ioctl (bnc#942511).\n- Btrfs: fix use-after-free in mount_subvol().\n- Btrfs: fix wrong check for btrfs_force_chunk_alloc() (bnc#938550).\n- Btrfs: lock superblock before remounting for rw subvol (bsc#934962).\n- Btrfs: pass unaligned length to btrfs_cmp_data() (bsc#937609).\n- Btrfs: remove all subvol options before mounting top-level\n (bsc#934962).\n- Btrfs: show subvol= and subvolid= in /proc/mounts (bsc#934962).\n- Btrfs: unify subvol= and subvolid= mounting (bsc#934962).\n- Btrfs: fill -\u003elast_trans for delayed inode in btrfs_fill_inode\n (bnc#942925).\n- Btrfs: fix metadata inconsistencies after directory fsync (bnc#942925).\n- Btrfs: fix stale dir entries after removing a link and fsync\n (bnc#942925).\n- Btrfs: fix stale dir entries after unlink, inode eviction and fsync\n (bnc#942925).\n- Btrfs: fix stale directory entries after fsync log replay (bnc#942925).\n- Btrfs: make btrfs_search_forward return with nodes unlocked\n (bnc#942925).\n- Btrfs: support NFSv2 export (bnc#929871).\n- Btrfs: update fix for read corruption of compressed and shared extents\n (bsc#948256).\n- Drivers: hv: do not do hypercalls when hypercall_page is NULL.\n- Drivers: hv: vmbus: add special crash handler.\n- Drivers: hv: vmbus: add special kexec handler.\n- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from\n hv_synic_cleanup().\n- Input: evdev - do not report errors form flush() (bsc#939834).\n- Input: synaptics - do not retrieve the board id on old firmwares\n (bsc#929092).\n- Input: synaptics - log queried and quirked dimension values\n (bsc#929092).\n- Input: synaptics - query min dimensions for fw v8.1.\n- Input: synaptics - remove X1 Carbon 3rd gen from the topbuttonpad list\n (bsc#929092).\n- Input: synaptics - remove X250 from the topbuttonpad list.\n- Input: synaptics - remove obsolete min/max quirk for X240 (bsc#929092).\n- Input: synaptics - skip quirks when post-2013 dimensions (bsc#929092).\n- Input: synaptics - split synaptics_resolution(), query first\n (bsc#929092).\n- Input: synaptics - support min/max board id in min_max_pnpid_table\n (bsc#929092).\n- NFS: Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- NFSv4: do not set SETATTR for O_RDONLY|O_EXCL (bsc#939716).\n- PCI: Move MPS configuration check to pci_configure_device()\n (bsc#943313).\n- PCI: Set MPS to match upstream bridge (bsc#943313).\n- SCSI: fix regression in scsi_send_eh_cmnd() (bsc#930813).\n- SCSI: fix scsi_error_handler vs. scsi_host_dev_release race\n (bnc#942204).\n- SCSI: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398).\n- UAS: fixup for remaining use of dead_list (bnc#934942).\n- USB: storage: use %*ph specifier to dump small buffers (bnc#934942).\n- aio: fix reqs_available handling (bsc#943378).\n- audit: do not generate loginuid log when audit disabled (bsc#941098).\n- blk-merge: do not compute bi_phys_segments from bi_vcnt for cloned bio\n (bnc#934430).\n- blk-merge: fix blk_recount_segments (bnc#934430).\n- blk-merge: recaculate segment if it isn\u0027t less than max segments\n (bnc#934430).\n- block: add queue flag for disabling SG merging (bnc#934430).\n- block: blk-merge: fix blk_recount_segments() (bnc#934430).\n- config: disable CONFIG_TCM_RBD on ppc64le and s390x\n- cpufreq: intel_pstate: Add CPU ID for Braswell processor.\n- dlm: fix missing endian conversion of rcom_status flags (bsc#940679).\n- dm cache mq: fix memory allocation failure for large cache devices\n (bsc#942707).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt\n (bsc#942938).\n- drm/i915: Make hpd arrays big enough to avoid out of bounds access\n (bsc#942938).\n- drm/i915: Only print hotplug event message when hotplug bit is set\n (bsc#942938).\n- drm/i915: Queue reenable timer also when enable_hotplug_processing is\n false (bsc#942938).\n- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler()\n (bsc#942938).\n- drm/radeon: fix hotplug race at startup (bsc#942307).\n- ethtool, net/mlx4_en: Add 100M, 20G, 56G speeds ethtool reporting\n support (bsc#945710).\n- hrtimer: prevent timer interrupt DoS (bnc#886785).\n- hv: fcopy: add memory barrier to propagate state (bnc#943529).\n- inotify: Fix nested sleeps in inotify_read() (bsc#940925).\n- intel_pstate: Add CPU IDs for Broadwell processors.\n- intel_pstate: Add CPUID for BDW-H CPU.\n- intel_pstate: Add support for SkyLake.\n- intel_pstate: Correct BYT VID values (bnc#907973).\n- intel_pstate: Remove periodic P state boost (bnc#907973).\n- intel_pstate: add sample time scaling (bnc#907973, bnc#924722,\n bnc#916543).\n- intel_pstate: don\u0027t touch turbo bit if turbo disabled or unavailable\n (bnc#907973).\n- intel_pstate: remove setting P state to MAX on init (bnc#907973).\n- intel_pstate: remove unneeded sample buffers (bnc#907973).\n- intel_pstate: set BYT MSR with wrmsrl_on_cpu() (bnc#907973).\n- ipr: Fix incorrect trace indexing (bsc#940912).\n- ipr: Fix invalid array indexing for HRRQ (bsc#940912).\n- iwlwifi: dvm: drop non VO frames when flushing (bsc#940545).\n- kABI workaround for ieee80211_ops.flush argument change (bsc#940545).\n- kconfig: Do not print status messages in make -s mode (bnc#942160).\n- kernel/modsign_uefi.c: Check for EFI_RUNTIME_SERVICES in\n load_uefi_certs (bsc#856382).\n- kernel: do full redraw of the 3270 screen on reconnect (bnc#943476,\n LTC#129509).\n- kexec: define kexec_in_progress in !CONFIG_KEXEC case.\n- kvm: Use WARN_ON_ONCE for missing X86_FEATURE_NRIPS (bsc#947537).\n- lpfc: Fix scsi prep dma buf error (bsc#908950).\n- mac80211: add vif to flush call (bsc#940545).\n- md/bitmap: do not abuse i_writecount for bitmap files (bsc#943270).\n- md/bitmap: protect clearing of -\u0026gt;bitmap by mddev-\u0026gt;lock\n (bnc#912183).\n- md/raid5: use -\u0026gt;lock to protect accessing raid5 sysfs attributes\n (bnc#912183).\n- md: fix problems with freeing private data after -\u0026gt;run failure\n (bnc#912183).\n- md: level_store: group all important changes into one place\n (bnc#912183).\n- md: move GET_BITMAP_FILE ioctl out from mddev_lock (bsc#943270).\n- md: protect -\u0026gt;pers changes with mddev-\u0026gt;lock (bnc#912183).\n- md: remove mddev_lock from rdev_attr_show() (bnc#912183).\n- md: remove mddev_lock() from md_attr_show() (bnc#912183).\n- md: remove need for mddev_lock() in md_seq_show() (bnc#912183).\n- md: split detach operation out from -\u0026gt;stop (bnc#912183).\n- md: tidy up set_bitmap_file (bsc#943270).\n- megaraid_sas: Handle firmware initialization after fast boot\n (bsc#922071).\n- mfd: lpc_ich: Assign subdevice ids automatically (bnc#898159).\n- mm: filemap: Avoid unnecessary barriers and waitqueue lookups -fix\n (VM/FS Performance (bnc#941951)).\n- mm: make page pfmemalloc check more robust (bnc#920016).\n- mm: numa: disable change protection for vma(VM_HUGETLB) (bnc#943573).\n- netfilter: nf_conntrack_proto_sctp: minimal multihoming support\n (bsc#932350).\n- net/mlx4_core: Add ethernet backplane autoneg device capability\n (bsc#945710).\n- net/mlx4_core: Introduce ACCESS_REG CMD and eth_prot_ctrl dev cap\n (bsc#945710).\n- net/mlx4_en: Use PTYS register to query ethtool settings (bsc#945710).\n- net/mlx4_en: Use PTYS register to set ethtool settings (Speed)\n (bsc#945710).\n- rcu: Reject memory-order-induced stall-warning false positives\n (bnc#941908).\n- s390/dasd: fix kernel panic when alias is set offline (bnc#940965,\n LTC#128595).\n- sched: Fix KMALLOC_MAX_SIZE overflow during cpumask allocation\n (bnc#939266).\n- sched: Fix cpu_active_mask/cpu_online_mask race (bsc#936773).\n- sched, numa: do not hint for NUMA balancing on VM_MIXEDMAP mappings\n (bnc#943573).\n- uas: Add US_FL_MAX_SECTORS_240 flag (bnc#934942).\n- uas: Add response iu handling (bnc#934942).\n- uas: Add uas_get_tag() helper function (bnc#934942).\n- uas: Check against unexpected completions (bnc#934942).\n- uas: Cleanup uas_log_cmd_state usage (bnc#934942).\n- uas: Do not log urb status error on cancellation (bnc#934942).\n- uas: Do not use scsi_host_find_tag (bnc#934942).\n- uas: Drop COMMAND_COMPLETED flag (bnc#934942).\n- uas: Drop all references to a scsi_cmnd once it has been aborted\n (bnc#934942).\n- uas: Drop inflight list (bnc#934942).\n- uas: Fix memleak of non-submitted urbs (bnc#934942).\n- uas: Fix resetting flag handling (bnc#934942).\n- uas: Free data urbs on completion (bnc#934942).\n- uas: Log error codes when logging errors (bnc#934942).\n- uas: Reduce number of function arguments for uas_alloc_foo functions\n (bnc#934942).\n- uas: Remove cmnd reference from the cmd urb (bnc#934942).\n- uas: Remove support for old sense ui as used in pre-production hardware\n (bnc#934942).\n- uas: Remove task-management / abort error handling code (bnc#934942).\n- uas: Set max_sectors_240 quirk for ASM1053 devices (bnc#934942).\n- uas: Simplify reset / disconnect handling (bnc#934942).\n- uas: Simplify unlink of data urbs on error (bnc#934942).\n- uas: Use scsi_print_command (bnc#934942).\n- uas: pre_reset and suspend: Fix a few races (bnc#934942).\n- uas: zap_pending: data urbs should have completed at this time\n (bnc#934942).\n- x86/kernel: Do not reserve crashkernel high memory if crashkernel low\n memory reserving failed (bsc#939145).\n- x86/smpboot: Check for cpu_active on cpu initialization (bsc#932285).\n- x86/smpboot: Check for cpu_active on cpu initialization (bsc#936773).\n- xhci: Workaround for PME stuck issues in Intel xhci (bnc#944028).\n- xhci: rework cycle bit checking for new dequeue pointers (bnc#944028).\n- xfs: Fix file type directory corruption for btree directories\n (bsc#941305).", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-668,SUSE-SLE-Live-Patching-12-2015-668,SUSE-SLE-Module-Public-Cloud-12-2015-668,SUSE-SLE-SDK-12-2015-668,SUSE-SLE-SERVER-12-2015-668,SUSE-SLE-WE-12-2015-668", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1727-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1727-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151727-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1727-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html" }, { "category": "self", "summary": "SUSE Bug 856382", "url": "https://bugzilla.suse.com/856382" }, { "category": "self", "summary": "SUSE Bug 886785", "url": "https://bugzilla.suse.com/886785" }, { "category": "self", "summary": "SUSE Bug 898159", "url": "https://bugzilla.suse.com/898159" }, { "category": "self", "summary": "SUSE Bug 907973", "url": "https://bugzilla.suse.com/907973" }, { "category": "self", "summary": "SUSE Bug 908950", "url": "https://bugzilla.suse.com/908950" }, { "category": "self", "summary": "SUSE Bug 912183", "url": "https://bugzilla.suse.com/912183" }, { "category": "self", "summary": "SUSE Bug 914818", "url": "https://bugzilla.suse.com/914818" }, { "category": "self", "summary": "SUSE Bug 916543", "url": "https://bugzilla.suse.com/916543" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 922071", "url": "https://bugzilla.suse.com/922071" }, { "category": "self", "summary": "SUSE Bug 924722", "url": "https://bugzilla.suse.com/924722" }, { "category": "self", "summary": "SUSE Bug 929092", "url": "https://bugzilla.suse.com/929092" }, { "category": "self", "summary": "SUSE Bug 929871", "url": "https://bugzilla.suse.com/929871" }, { "category": "self", "summary": "SUSE Bug 930813", "url": "https://bugzilla.suse.com/930813" }, { "category": "self", "summary": "SUSE Bug 932285", "url": "https://bugzilla.suse.com/932285" }, { "category": "self", "summary": "SUSE Bug 932350", "url": "https://bugzilla.suse.com/932350" }, { "category": "self", "summary": "SUSE Bug 934430", "url": "https://bugzilla.suse.com/934430" }, { "category": "self", "summary": "SUSE Bug 934942", "url": "https://bugzilla.suse.com/934942" }, { "category": "self", "summary": "SUSE Bug 934962", "url": "https://bugzilla.suse.com/934962" }, { "category": "self", "summary": "SUSE Bug 936556", "url": "https://bugzilla.suse.com/936556" }, { "category": "self", "summary": "SUSE Bug 936773", "url": "https://bugzilla.suse.com/936773" }, { "category": "self", "summary": "SUSE Bug 937609", "url": "https://bugzilla.suse.com/937609" }, { "category": "self", "summary": "SUSE Bug 937612", "url": "https://bugzilla.suse.com/937612" }, { "category": "self", "summary": "SUSE Bug 937613", "url": "https://bugzilla.suse.com/937613" }, { "category": "self", "summary": "SUSE Bug 937616", "url": "https://bugzilla.suse.com/937616" }, { "category": "self", "summary": "SUSE Bug 938550", "url": "https://bugzilla.suse.com/938550" }, { "category": "self", "summary": "SUSE Bug 938706", "url": "https://bugzilla.suse.com/938706" }, { "category": "self", "summary": "SUSE Bug 938891", "url": "https://bugzilla.suse.com/938891" }, { "category": "self", "summary": "SUSE Bug 938892", "url": "https://bugzilla.suse.com/938892" }, { "category": "self", "summary": "SUSE Bug 938893", "url": "https://bugzilla.suse.com/938893" }, { "category": "self", "summary": "SUSE Bug 939145", "url": "https://bugzilla.suse.com/939145" }, { "category": "self", "summary": "SUSE Bug 939266", "url": "https://bugzilla.suse.com/939266" }, { "category": "self", "summary": "SUSE Bug 939716", "url": "https://bugzilla.suse.com/939716" }, { "category": "self", "summary": "SUSE Bug 939834", "url": "https://bugzilla.suse.com/939834" }, { "category": "self", "summary": "SUSE Bug 939994", "url": "https://bugzilla.suse.com/939994" }, { "category": "self", "summary": "SUSE Bug 940398", "url": "https://bugzilla.suse.com/940398" }, { "category": "self", "summary": "SUSE Bug 940545", "url": "https://bugzilla.suse.com/940545" }, { "category": "self", "summary": "SUSE Bug 940679", "url": "https://bugzilla.suse.com/940679" }, { "category": "self", "summary": "SUSE Bug 940776", "url": "https://bugzilla.suse.com/940776" }, { "category": "self", "summary": "SUSE Bug 940912", "url": "https://bugzilla.suse.com/940912" }, { "category": "self", "summary": "SUSE Bug 940925", "url": "https://bugzilla.suse.com/940925" }, { "category": "self", "summary": "SUSE Bug 940965", "url": "https://bugzilla.suse.com/940965" }, { "category": "self", "summary": "SUSE Bug 941098", "url": "https://bugzilla.suse.com/941098" }, { "category": "self", "summary": "SUSE Bug 941305", "url": "https://bugzilla.suse.com/941305" }, { "category": "self", "summary": "SUSE Bug 941908", "url": "https://bugzilla.suse.com/941908" }, { "category": "self", "summary": "SUSE Bug 941951", "url": "https://bugzilla.suse.com/941951" }, { "category": "self", "summary": "SUSE Bug 942160", "url": "https://bugzilla.suse.com/942160" }, { "category": "self", "summary": "SUSE Bug 942204", "url": "https://bugzilla.suse.com/942204" }, { "category": "self", "summary": "SUSE Bug 942307", "url": "https://bugzilla.suse.com/942307" }, { "category": "self", "summary": "SUSE Bug 942367", "url": "https://bugzilla.suse.com/942367" }, { "category": "self", "summary": "SUSE Bug 948536", "url": "https://bugzilla.suse.com/948536" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5156 page", "url": "https://www.suse.com/security/cve/CVE-2015-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5157 page", "url": "https://www.suse.com/security/cve/CVE-2015-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5283 page", "url": "https://www.suse.com/security/cve/CVE-2015-5283/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5697 page", "url": "https://www.suse.com/security/cve/CVE-2015-5697/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6252 page", "url": "https://www.suse.com/security/cve/CVE-2015-6252/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7613 page", "url": "https://www.suse.com/security/cve/CVE-2015-7613/" } ], "title": "Security update for kernel-source", "tracking": { "current_release_date": "2015-10-05T22:31:57Z", "generator": { "date": "2015-10-05T22:31:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1727-1", "initial_release_date": "2015-10-05T22:31:57Z", "revision_history": [ { "date": "2015-10-05T22:31:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.48-52.27.1.noarch", "product": { "name": "kernel-devel-3.12.48-52.27.1.noarch", "product_id": "kernel-devel-3.12.48-52.27.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.48-52.27.1.noarch", "product": { "name": "kernel-macros-3.12.48-52.27.1.noarch", "product_id": "kernel-macros-3.12.48-52.27.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.48-52.27.1.noarch", "product": { "name": "kernel-source-3.12.48-52.27.1.noarch", "product_id": "kernel-source-3.12.48-52.27.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.48-52.27.2.noarch", "product": { "name": "kernel-docs-3.12.48-52.27.2.noarch", "product_id": "kernel-docs-3.12.48-52.27.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.48-52.27.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.48-52.27.1.ppc64le", "product_id": "kernel-obs-build-3.12.48-52.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.48-52.27.1.ppc64le", "product": { "name": "kernel-default-3.12.48-52.27.1.ppc64le", "product_id": "kernel-default-3.12.48-52.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.48-52.27.1.ppc64le", "product": { "name": "kernel-default-base-3.12.48-52.27.1.ppc64le", "product_id": "kernel-default-base-3.12.48-52.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.48-52.27.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.48-52.27.1.ppc64le", "product_id": "kernel-default-devel-3.12.48-52.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.48-52.27.1.ppc64le", "product": { "name": "kernel-syms-3.12.48-52.27.1.ppc64le", "product_id": "kernel-syms-3.12.48-52.27.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.48-52.27.1.s390x", "product": { "name": "kernel-obs-build-3.12.48-52.27.1.s390x", "product_id": "kernel-obs-build-3.12.48-52.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.48-52.27.1.s390x", "product": { "name": "kernel-default-3.12.48-52.27.1.s390x", "product_id": "kernel-default-3.12.48-52.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.48-52.27.1.s390x", "product": { "name": "kernel-default-base-3.12.48-52.27.1.s390x", "product_id": "kernel-default-base-3.12.48-52.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.48-52.27.1.s390x", "product": { "name": "kernel-default-devel-3.12.48-52.27.1.s390x", "product_id": "kernel-default-devel-3.12.48-52.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.48-52.27.1.s390x", "product": { "name": "kernel-default-man-3.12.48-52.27.1.s390x", "product_id": "kernel-default-man-3.12.48-52.27.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.48-52.27.1.s390x", "product": { "name": "kernel-syms-3.12.48-52.27.1.s390x", "product_id": "kernel-syms-3.12.48-52.27.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.48-52.27.1.x86_64", "product": { "name": "kernel-default-3.12.48-52.27.1.x86_64", "product_id": "kernel-default-3.12.48-52.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.48-52.27.1.x86_64", "product": { "name": "kernel-default-devel-3.12.48-52.27.1.x86_64", "product_id": "kernel-default-devel-3.12.48-52.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.48-52.27.1.x86_64", "product": { "name": "kernel-default-extra-3.12.48-52.27.1.x86_64", "product_id": "kernel-default-extra-3.12.48-52.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.48-52.27.1.x86_64", "product": { "name": "kernel-syms-3.12.48-52.27.1.x86_64", "product_id": "kernel-syms-3.12.48-52.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.48-52.27.2.x86_64", "product": { "name": "kernel-xen-3.12.48-52.27.2.x86_64", "product_id": "kernel-xen-3.12.48-52.27.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.48-52.27.2.x86_64", "product": { "name": "kernel-xen-devel-3.12.48-52.27.2.x86_64", "product_id": "kernel-xen-devel-3.12.48-52.27.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "product": { "name": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "product_id": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "product": { "name": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "product_id": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.48-52.27.1.x86_64", "product": { "name": "kernel-ec2-3.12.48-52.27.1.x86_64", "product_id": "kernel-ec2-3.12.48-52.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.48-52.27.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.48-52.27.1.x86_64", "product_id": "kernel-ec2-devel-3.12.48-52.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.48-52.27.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.48-52.27.1.x86_64", "product_id": "kernel-ec2-extra-3.12.48-52.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.48-52.27.1.x86_64", "product": { "name": "kernel-obs-build-3.12.48-52.27.1.x86_64", "product_id": "kernel-obs-build-3.12.48-52.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.48-52.27.1.x86_64", "product": { "name": "kernel-default-base-3.12.48-52.27.1.x86_64", "product_id": "kernel-default-base-3.12.48-52.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.48-52.27.2.x86_64", "product": { "name": "kernel-xen-base-3.12.48-52.27.2.x86_64", "product_id": "kernel-xen-base-3.12.48-52.27.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch" }, "product_reference": "kernel-devel-3.12.48-52.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch" }, "product_reference": "kernel-macros-3.12.48-52.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch" }, "product_reference": "kernel-source-3.12.48-52.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-syms-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64" }, "product_reference": "kernel-xen-3.12.48-52.27.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.48-52.27.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-ec2-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.48-52.27.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch" }, "product_reference": "kernel-docs-3.12.48-52.27.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.48-52.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-obs-build-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le" }, "product_reference": "kernel-default-3.12.48-52.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-default-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.48-52.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-default-base-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-base-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.48-52.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-default-devel-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-default-man-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch" }, "product_reference": "kernel-devel-3.12.48-52.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch" }, "product_reference": "kernel-macros-3.12.48-52.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch" }, "product_reference": "kernel-source-3.12.48-52.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le" }, "product_reference": "kernel-syms-3.12.48-52.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-syms-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-syms-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64" }, "product_reference": "kernel-xen-3.12.48-52.27.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.48-52.27.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.48-52.27.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le" }, "product_reference": "kernel-default-3.12.48-52.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-default-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.48-52.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-default-base-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-base-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.48-52.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-default-devel-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-default-man-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch" }, "product_reference": "kernel-devel-3.12.48-52.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch" }, "product_reference": "kernel-macros-3.12.48-52.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch" }, "product_reference": "kernel-source-3.12.48-52.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le" }, "product_reference": "kernel-syms-3.12.48-52.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x" }, "product_reference": "kernel-syms-3.12.48-52.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-syms-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64" }, "product_reference": "kernel-xen-3.12.48-52.27.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.48-52.27.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.48-52.27.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.48-52.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5156" } ], "notes": [ { "category": "general", "text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5156", "url": "https://www.suse.com/security/cve/CVE-2015-5156" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1123903" }, { "category": "external", "summary": "SUSE Bug 940776 for CVE-2015-5156", "url": "https://bugzilla.suse.com/940776" }, { "category": "external", "summary": "SUSE Bug 945048 for CVE-2015-5156", "url": "https://bugzilla.suse.com/945048" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-5156", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T22:31:57Z", "details": "moderate" } ], "title": "CVE-2015-5156" }, { "cve": "CVE-2015-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5157" } ], "notes": [ { "category": "general", "text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5157", "url": "https://www.suse.com/security/cve/CVE-2015-5157" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 937969 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937969" }, { "category": "external", "summary": "SUSE Bug 937970 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937970" }, { "category": "external", "summary": "SUSE Bug 938706 for CVE-2015-5157", "url": "https://bugzilla.suse.com/938706" }, { "category": "external", "summary": "SUSE Bug 939207 for CVE-2015-5157", "url": "https://bugzilla.suse.com/939207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T22:31:57Z", "details": "important" } ], "title": "CVE-2015-5157" }, { "cve": "CVE-2015-5283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5283" } ], "notes": [ { "category": "general", "text": "The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5283", "url": "https://www.suse.com/security/cve/CVE-2015-5283" }, { "category": "external", "summary": "SUSE Bug 947155 for CVE-2015-5283", "url": "https://bugzilla.suse.com/947155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T22:31:57Z", "details": "moderate" } ], "title": "CVE-2015-5283" }, { "cve": "CVE-2015-5697", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5697" } ], "notes": [ { "category": "general", "text": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5697", "url": "https://www.suse.com/security/cve/CVE-2015-5697" }, { "category": "external", "summary": "SUSE Bug 939994 for CVE-2015-5697", "url": "https://bugzilla.suse.com/939994" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-5697", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T22:31:57Z", "details": "low" } ], "title": "CVE-2015-5697" }, { "cve": "CVE-2015-6252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6252" } ], "notes": [ { "category": "general", "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6252", "url": "https://www.suse.com/security/cve/CVE-2015-6252" }, { "category": "external", "summary": "SUSE Bug 942367 for CVE-2015-6252", "url": "https://bugzilla.suse.com/942367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T22:31:57Z", "details": "low" } ], "title": "CVE-2015-6252" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T22:31:57Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7613" } ], "notes": [ { "category": "general", "text": "Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7613", "url": "https://www.suse.com/security/cve/CVE-2015-7613" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-7613", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 948536 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948536" }, { "category": "external", "summary": "SUSE Bug 948701 for CVE-2015-7613", "url": "https://bugzilla.suse.com/948701" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-7613", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-05T22:31:57Z", "details": "important" } ], "title": "CVE-2015-7613" } ] }
suse-su-2016:2074-1
Vulnerability from csaf_suse
Published
2016-08-15 10:48
Modified
2016-08-15 10:48
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP2 kernel was updated to receive various security and bug fixes.
The following security bugs were fixed:
- CVE-2016-4486: Fixed 4 byte information leak in net/core/rtnetlink.c (bsc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512).
- CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013).
- CVE-2016-2547: sound/core/timer.c in the Linux kernel employed a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011).
- CVE-2016-2548: sound/core/timer.c in the Linux kernel retained certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012).
- CVE-2016-2546: sound/core/timer.c in the Linux kernel used an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975).
- CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974).
- CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973).
- CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972).
- CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693).
- CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel .4.1 allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).
- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).
- CVE-2015-7515: The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints (bnc#956708).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).
- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015 (bnc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#952384).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation (bnc#942367).
- CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel allowed local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped (bnc#928130).
The following non-security bugs were fixed:
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- Fix lpfc_send_rscn_event allocation size claims bnc#935757
- Fix ntpd clock synchronization in Xen PV domains (bnc#816446).
- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- SCSI: bfa: Fix to handle firmware tskim abort request response (bsc#972510).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bsc#977847).
- nf_conntrack: fix bsc#758540 kabi fix (bsc#946117).
- privcmd: allow preempting long running user-mode originating hypercalls (bnc#861093).
- s390/cio: collect format 1 channel-path description data (bsc#966460, bsc#966662).
- s390/cio: ensure consistent measurement state (bsc#966460, bsc#966662).
- s390/cio: fix measurement characteristics memleak (bsc#966460, bsc#966662).
- s390/cio: update measurement characteristics (bsc#966460, bsc#966662).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
Patchnames
slessp2-kernel-source-12693
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP2 kernel was updated to receive various security and bug fixes.\n\nThe following security bugs were fixed:\n- CVE-2016-4486: Fixed 4 byte information leak in net/core/rtnetlink.c (bsc#978822).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).\n- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).\n- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).\n- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).\n- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).\n- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).\n- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512).\n- CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013).\n- CVE-2016-2547: sound/core/timer.c in the Linux kernel employed a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011).\n- CVE-2016-2548: sound/core/timer.c in the Linux kernel retained certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012).\n- CVE-2016-2546: sound/core/timer.c in the Linux kernel used an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975).\n- CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974).\n- CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973).\n- CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972).\n- CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693).\n- CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437).\n- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).\n- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel .4.1 allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).\n- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).\n- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).\n- CVE-2015-7515: The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints (bnc#956708).\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).\n- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).\n- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).\n- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).\n- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).\n- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).\n- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015 (bnc#956709).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).\n- CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#952384).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).\n- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation (bnc#942367).\n- CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel allowed local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped (bnc#928130).\n\nThe following non-security bugs were fixed:\n- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).\n- Fix lpfc_send_rscn_event allocation size claims bnc#935757\n- Fix ntpd clock synchronization in Xen PV domains (bnc#816446).\n- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).\n- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- SCSI: bfa: Fix to handle firmware tskim abort request response (bsc#972510).\n- USB: usbip: fix potential out-of-bounds write (bnc#975945).\n- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).\n- dm-snap: avoid deadock on s-\u003elock when a read is split (bsc#939826).\n- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bsc#977847).\n- nf_conntrack: fix bsc#758540 kabi fix (bsc#946117).\n- privcmd: allow preempting long running user-mode originating hypercalls (bnc#861093).\n- s390/cio: collect format 1 channel-path description data (bsc#966460, bsc#966662).\n- s390/cio: ensure consistent measurement state (bsc#966460, bsc#966662).\n- s390/cio: fix measurement characteristics memleak (bsc#966460, bsc#966662).\n- s390/cio: update measurement characteristics (bsc#966460, bsc#966662).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-kernel-source-12693", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2074-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2074-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162074-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2074-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" }, { "category": "self", "summary": "SUSE Bug 816446", "url": "https://bugzilla.suse.com/816446" }, { "category": "self", "summary": "SUSE Bug 861093", "url": "https://bugzilla.suse.com/861093" }, { "category": "self", "summary": "SUSE Bug 928130", "url": "https://bugzilla.suse.com/928130" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 942367", "url": "https://bugzilla.suse.com/942367" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 946117", "url": "https://bugzilla.suse.com/946117" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 948562", "url": "https://bugzilla.suse.com/948562" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949936", "url": "https://bugzilla.suse.com/949936" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE Bug 955354", "url": "https://bugzilla.suse.com/955354" }, { "category": "self", "summary": "SUSE Bug 955654", "url": "https://bugzilla.suse.com/955654" }, { "category": "self", "summary": "SUSE Bug 956708", "url": "https://bugzilla.suse.com/956708" }, { "category": "self", "summary": "SUSE Bug 956709", "url": "https://bugzilla.suse.com/956709" }, { "category": "self", "summary": "SUSE Bug 958463", "url": "https://bugzilla.suse.com/958463" }, { "category": "self", "summary": "SUSE Bug 958886", "url": "https://bugzilla.suse.com/958886" }, { "category": "self", "summary": "SUSE Bug 958951", "url": "https://bugzilla.suse.com/958951" }, { "category": "self", "summary": "SUSE Bug 959190", "url": "https://bugzilla.suse.com/959190" }, { "category": "self", "summary": "SUSE Bug 959399", "url": "https://bugzilla.suse.com/959399" }, { "category": "self", "summary": "SUSE Bug 961500", "url": "https://bugzilla.suse.com/961500" }, { "category": "self", "summary": "SUSE Bug 961509", "url": "https://bugzilla.suse.com/961509" }, { "category": "self", "summary": "SUSE Bug 961512", "url": "https://bugzilla.suse.com/961512" }, { "category": "self", "summary": "SUSE Bug 963765", "url": "https://bugzilla.suse.com/963765" }, { "category": "self", "summary": "SUSE Bug 963767", "url": "https://bugzilla.suse.com/963767" }, { "category": "self", "summary": "SUSE Bug 964201", "url": "https://bugzilla.suse.com/964201" }, { "category": "self", "summary": "SUSE Bug 966437", "url": "https://bugzilla.suse.com/966437" }, { "category": "self", "summary": "SUSE Bug 966460", "url": "https://bugzilla.suse.com/966460" }, { "category": "self", "summary": "SUSE Bug 966662", "url": "https://bugzilla.suse.com/966662" }, { "category": "self", "summary": "SUSE Bug 966693", "url": "https://bugzilla.suse.com/966693" }, { "category": "self", "summary": "SUSE Bug 967972", "url": "https://bugzilla.suse.com/967972" }, { "category": "self", "summary": "SUSE Bug 967973", "url": "https://bugzilla.suse.com/967973" }, { "category": "self", "summary": "SUSE Bug 967974", "url": "https://bugzilla.suse.com/967974" }, { "category": "self", "summary": "SUSE Bug 967975", "url": "https://bugzilla.suse.com/967975" }, { "category": "self", "summary": "SUSE Bug 968010", "url": "https://bugzilla.suse.com/968010" }, { "category": "self", "summary": "SUSE Bug 968011", "url": "https://bugzilla.suse.com/968011" }, { "category": "self", "summary": "SUSE Bug 968012", "url": "https://bugzilla.suse.com/968012" }, { "category": "self", "summary": "SUSE Bug 968013", "url": "https://bugzilla.suse.com/968013" }, { "category": "self", "summary": "SUSE Bug 968670", "url": "https://bugzilla.suse.com/968670" }, { "category": "self", "summary": "SUSE Bug 970504", "url": "https://bugzilla.suse.com/970504" }, { "category": "self", "summary": "SUSE Bug 970892", "url": "https://bugzilla.suse.com/970892" }, { "category": "self", "summary": "SUSE Bug 970909", "url": "https://bugzilla.suse.com/970909" }, { "category": "self", "summary": "SUSE Bug 970911", "url": "https://bugzilla.suse.com/970911" }, { "category": "self", "summary": "SUSE Bug 970948", "url": "https://bugzilla.suse.com/970948" }, { "category": "self", "summary": "SUSE Bug 970956", "url": "https://bugzilla.suse.com/970956" }, { "category": "self", "summary": "SUSE Bug 970958", "url": "https://bugzilla.suse.com/970958" }, { "category": "self", "summary": "SUSE Bug 970970", "url": "https://bugzilla.suse.com/970970" }, { "category": "self", "summary": "SUSE Bug 971124", "url": "https://bugzilla.suse.com/971124" }, { "category": "self", "summary": "SUSE Bug 971125", "url": "https://bugzilla.suse.com/971125" }, { "category": "self", "summary": "SUSE Bug 971126", "url": "https://bugzilla.suse.com/971126" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 972510", "url": "https://bugzilla.suse.com/972510" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 975945", "url": "https://bugzilla.suse.com/975945" }, { "category": "self", "summary": "SUSE Bug 977847", "url": "https://bugzilla.suse.com/977847" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2015 page", "url": "https://www.suse.com/security/cve/CVE-2013-2015/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3339 page", "url": "https://www.suse.com/security/cve/CVE-2015-3339/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6252 page", "url": "https://www.suse.com/security/cve/CVE-2015-6252/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7509 page", "url": "https://www.suse.com/security/cve/CVE-2015-7509/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7515 page", "url": "https://www.suse.com/security/cve/CVE-2015-7515/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7550 page", "url": "https://www.suse.com/security/cve/CVE-2015-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7566 page", "url": "https://www.suse.com/security/cve/CVE-2015-7566/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8543 page", "url": "https://www.suse.com/security/cve/CVE-2015-8543/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8569 page", "url": "https://www.suse.com/security/cve/CVE-2015-8569/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8575 page", "url": "https://www.suse.com/security/cve/CVE-2015-8575/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8767 page", "url": "https://www.suse.com/security/cve/CVE-2015-8767/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8785 page", "url": "https://www.suse.com/security/cve/CVE-2015-8785/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8812 page", "url": "https://www.suse.com/security/cve/CVE-2015-8812/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0723 page", "url": "https://www.suse.com/security/cve/CVE-2016-0723/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2069 page", "url": "https://www.suse.com/security/cve/CVE-2016-2069/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2143 page", "url": "https://www.suse.com/security/cve/CVE-2016-2143/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2184 page", "url": "https://www.suse.com/security/cve/CVE-2016-2184/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2185 page", "url": "https://www.suse.com/security/cve/CVE-2016-2185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2186 page", "url": "https://www.suse.com/security/cve/CVE-2016-2186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2188 page", "url": "https://www.suse.com/security/cve/CVE-2016-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2384 page", "url": "https://www.suse.com/security/cve/CVE-2016-2384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2543 page", "url": "https://www.suse.com/security/cve/CVE-2016-2543/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2544 page", "url": "https://www.suse.com/security/cve/CVE-2016-2544/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2545 page", "url": "https://www.suse.com/security/cve/CVE-2016-2545/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2546 page", "url": "https://www.suse.com/security/cve/CVE-2016-2546/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2547 page", "url": "https://www.suse.com/security/cve/CVE-2016-2547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2548 page", "url": "https://www.suse.com/security/cve/CVE-2016-2548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2549 page", "url": "https://www.suse.com/security/cve/CVE-2016-2549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2782 page", "url": "https://www.suse.com/security/cve/CVE-2016-2782/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2847 page", "url": "https://www.suse.com/security/cve/CVE-2016-2847/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3137 page", "url": "https://www.suse.com/security/cve/CVE-2016-3137/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3138 page", "url": "https://www.suse.com/security/cve/CVE-2016-3138/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3139 page", "url": "https://www.suse.com/security/cve/CVE-2016-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3140 page", "url": "https://www.suse.com/security/cve/CVE-2016-3140/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3156 page", "url": "https://www.suse.com/security/cve/CVE-2016-3156/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-08-15T10:48:57Z", "generator": { "date": "2016-08-15T10:48:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2074-1", "initial_release_date": "2016-08-15T10:48:57Z", "revision_history": [ { "date": "2016-08-15T10:48:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-default-3.0.101-0.7.40.1.i586", "product_id": "kernel-default-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-default-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-default-devel-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.7.40.1.i586", "product_id": "kernel-ec2-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-pae-3.0.101-0.7.40.1.i586", "product_id": "kernel-pae-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-pae-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-source-3.0.101-0.7.40.1.i586", "product_id": "kernel-source-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-syms-3.0.101-0.7.40.1.i586", "product_id": "kernel-syms-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-trace-3.0.101-0.7.40.1.i586", "product_id": "kernel-trace-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-trace-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-xen-3.0.101-0.7.40.1.i586", "product_id": "kernel-xen-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-xen-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.7.40.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-default-3.0.101-0.7.40.1.s390x", "product_id": "kernel-default-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.7.40.1.s390x", "product_id": "kernel-default-base-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.7.40.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.7.40.1.s390x", "product_id": "kernel-default-man-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-source-3.0.101-0.7.40.1.s390x", "product_id": "kernel-source-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.7.40.1.s390x", "product_id": "kernel-syms-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.7.40.1.s390x", "product_id": "kernel-trace-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.7.40.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.7.40.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-default-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-source-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-syms-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-trace-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-xen-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-default-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-source-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2015", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2015" } ], "notes": [ { "category": "general", "text": "The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable media, as demonstrated by the e2fsprogs tests/f_orphan_extents_inode/image.gz test.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2015", "url": "https://www.suse.com/security/cve/CVE-2013-2015" }, { "category": "external", "summary": "SUSE Bug 817377 for CVE-2013-2015", "url": "https://bugzilla.suse.com/817377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2013-2015" }, { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-3339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3339" } ], "notes": [ { "category": "general", "text": "Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3339", "url": "https://www.suse.com/security/cve/CVE-2015-3339" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-3339", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 928130 for CVE-2015-3339", "url": "https://bugzilla.suse.com/928130" }, { "category": "external", "summary": "SUSE Bug 939263 for CVE-2015-3339", "url": "https://bugzilla.suse.com/939263" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-3339" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6252" } ], "notes": [ { "category": "general", "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6252", "url": "https://www.suse.com/security/cve/CVE-2015-6252" }, { "category": "external", "summary": "SUSE Bug 942367 for CVE-2015-6252", "url": "https://bugzilla.suse.com/942367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-6252" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7509" } ], "notes": [ { "category": "general", "text": "fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7509", "url": "https://www.suse.com/security/cve/CVE-2015-7509" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7509", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 956707 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956707" }, { "category": "external", "summary": "SUSE Bug 956709 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956709" }, { "category": "external", "summary": "SUSE Bug 956766 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-7509" }, { "cve": "CVE-2015-7515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7515" } ], "notes": [ { "category": "general", "text": "The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7515", "url": "https://www.suse.com/security/cve/CVE-2015-7515" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7515", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 956708 for CVE-2015-7515", "url": "https://bugzilla.suse.com/956708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-7515" }, { "cve": "CVE-2015-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7550" } ], "notes": [ { "category": "general", "text": "The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7550", "url": "https://www.suse.com/security/cve/CVE-2015-7550" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 958951 for CVE-2015-7550", "url": "https://bugzilla.suse.com/958951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-7550" }, { "cve": "CVE-2015-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7566" } ], "notes": [ { "category": "general", "text": "The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7566", "url": "https://www.suse.com/security/cve/CVE-2015-7566" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7566", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961512 for CVE-2015-7566", "url": "https://bugzilla.suse.com/961512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-7566" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "critical" } ], "title": "CVE-2015-8104" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8215" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "important" } ], "title": "CVE-2015-8539" }, { "cve": "CVE-2015-8543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8543" } ], "notes": [ { "category": "general", "text": "The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8543", "url": "https://www.suse.com/security/cve/CVE-2015-8543" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8543", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8543", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8543", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8543", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 958886 for CVE-2015-8543", "url": "https://bugzilla.suse.com/958886" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8543", "url": "https://bugzilla.suse.com/963994" }, { "category": "external", "summary": "SUSE Bug 969522 for CVE-2015-8543", "url": "https://bugzilla.suse.com/969522" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-8543" }, { "cve": "CVE-2015-8569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8569" } ], "notes": [ { "category": "general", "text": "The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8569", "url": "https://www.suse.com/security/cve/CVE-2015-8569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8569", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 959190 for CVE-2015-8569", "url": "https://bugzilla.suse.com/959190" }, { "category": "external", "summary": "SUSE Bug 959399 for CVE-2015-8569", "url": "https://bugzilla.suse.com/959399" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8569", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8569" }, { "cve": "CVE-2015-8575", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8575" } ], "notes": [ { "category": "general", "text": "The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8575", "url": "https://www.suse.com/security/cve/CVE-2015-8575" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8575", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 959190 for CVE-2015-8575", "url": "https://bugzilla.suse.com/959190" }, { "category": "external", "summary": "SUSE Bug 959399 for CVE-2015-8575", "url": "https://bugzilla.suse.com/959399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8575" }, { "cve": "CVE-2015-8767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8767" } ], "notes": [ { "category": "general", "text": "net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8767", "url": "https://www.suse.com/security/cve/CVE-2015-8767" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8767", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8767", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 961509 for CVE-2015-8767", "url": "https://bugzilla.suse.com/961509" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8767" }, { "cve": "CVE-2015-8785", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8785" } ], "notes": [ { "category": "general", "text": "The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8785", "url": "https://www.suse.com/security/cve/CVE-2015-8785" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8785", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963765 for CVE-2015-8785", "url": "https://bugzilla.suse.com/963765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8785" }, { "cve": "CVE-2015-8812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8812" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8812", "url": "https://www.suse.com/security/cve/CVE-2015-8812" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8812", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8812", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 966437 for CVE-2015-8812", "url": "https://bugzilla.suse.com/966437" }, { "category": "external", "summary": "SUSE Bug 966683 for CVE-2015-8812", "url": "https://bugzilla.suse.com/966683" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-8812" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0723" } ], "notes": [ { "category": "general", "text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0723", "url": "https://www.suse.com/security/cve/CVE-2016-0723" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0723", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961500 for CVE-2016-0723", "url": "https://bugzilla.suse.com/961500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-0723" }, { "cve": "CVE-2016-2069", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2069" } ], "notes": [ { "category": "general", "text": "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2069", "url": "https://www.suse.com/security/cve/CVE-2016-2069" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-2069", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 963767 for CVE-2016-2069", "url": "https://bugzilla.suse.com/963767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2069" }, { "cve": "CVE-2016-2143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2143" } ], "notes": [ { "category": "general", "text": "The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2143", "url": "https://www.suse.com/security/cve/CVE-2016-2143" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2143", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 970504 for CVE-2016-2143", "url": "https://bugzilla.suse.com/970504" }, { "category": "external", "summary": "SUSE Bug 993872 for CVE-2016-2143", "url": "https://bugzilla.suse.com/993872" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "important" } ], "title": "CVE-2016-2143" }, { "cve": "CVE-2016-2184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2184" } ], "notes": [ { "category": "general", "text": "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2184", "url": "https://www.suse.com/security/cve/CVE-2016-2184" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2184", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971125 for CVE-2016-2184", "url": "https://bugzilla.suse.com/971125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2184" }, { "cve": "CVE-2016-2185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2185" } ], "notes": [ { "category": "general", "text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2185", "url": "https://www.suse.com/security/cve/CVE-2016-2185" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2185", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971124 for CVE-2016-2185", "url": "https://bugzilla.suse.com/971124" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2185" }, { "cve": "CVE-2016-2186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2186" } ], "notes": [ { "category": "general", "text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2186", "url": "https://www.suse.com/security/cve/CVE-2016-2186" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2186", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970958 for CVE-2016-2186", "url": "https://bugzilla.suse.com/970958" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2186" }, { "cve": "CVE-2016-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2188" } ], "notes": [ { "category": "general", "text": "The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2188", "url": "https://www.suse.com/security/cve/CVE-2016-2188" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1067912 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1067912" }, { "category": "external", "summary": "SUSE Bug 1132190 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1132190" }, { "category": "external", "summary": "SUSE Bug 970956 for CVE-2016-2188", "url": "https://bugzilla.suse.com/970956" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2188" }, { "cve": "CVE-2016-2384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2384" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2384", "url": "https://www.suse.com/security/cve/CVE-2016-2384" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2384", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 966693 for CVE-2016-2384", "url": "https://bugzilla.suse.com/966693" }, { "category": "external", "summary": "SUSE Bug 967773 for CVE-2016-2384", "url": "https://bugzilla.suse.com/967773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2384" }, { "cve": "CVE-2016-2543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2543" } ], "notes": [ { "category": "general", "text": "The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2543", "url": "https://www.suse.com/security/cve/CVE-2016-2543" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2543", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 967972 for CVE-2016-2543", "url": "https://bugzilla.suse.com/967972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2543" }, { "cve": "CVE-2016-2544", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2544" } ], "notes": [ { "category": "general", "text": "Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel before 4.4.1 allows local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2544", "url": "https://www.suse.com/security/cve/CVE-2016-2544" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2544", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 967973 for CVE-2016-2544", "url": "https://bugzilla.suse.com/967973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2544" }, { "cve": "CVE-2016-2545", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2545" } ], "notes": [ { "category": "general", "text": "The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel before 4.4.1 does not properly maintain a certain linked list, which allows local users to cause a denial of service (race condition and system crash) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2545", "url": "https://www.suse.com/security/cve/CVE-2016-2545" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2545", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 967974 for CVE-2016-2545", "url": "https://bugzilla.suse.com/967974" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2545" }, { "cve": "CVE-2016-2546", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2546" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2546", "url": "https://www.suse.com/security/cve/CVE-2016-2546" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2546", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 967975 for CVE-2016-2546", "url": "https://bugzilla.suse.com/967975" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2546" }, { "cve": "CVE-2016-2547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2547" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2547", "url": "https://www.suse.com/security/cve/CVE-2016-2547" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2547", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968011 for CVE-2016-2547", "url": "https://bugzilla.suse.com/968011" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2547" }, { "cve": "CVE-2016-2548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2548" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2548", "url": "https://www.suse.com/security/cve/CVE-2016-2548" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2548", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968012 for CVE-2016-2548", "url": "https://bugzilla.suse.com/968012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2548" }, { "cve": "CVE-2016-2549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2549" } ], "notes": [ { "category": "general", "text": "sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent recursive callback access, which allows local users to cause a denial of service (deadlock) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2549", "url": "https://www.suse.com/security/cve/CVE-2016-2549" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2549", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968013 for CVE-2016-2549", "url": "https://bugzilla.suse.com/968013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2549" }, { "cve": "CVE-2016-2782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2782" } ], "notes": [ { "category": "general", "text": "The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2782", "url": "https://www.suse.com/security/cve/CVE-2016-2782" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2782", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961512 for CVE-2016-2782", "url": "https://bugzilla.suse.com/961512" }, { "category": "external", "summary": "SUSE Bug 968670 for CVE-2016-2782", "url": "https://bugzilla.suse.com/968670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2016-2782" }, { "cve": "CVE-2016-2847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2847" } ], "notes": [ { "category": "general", "text": "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2847", "url": "https://www.suse.com/security/cve/CVE-2016-2847" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2847", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970948 for CVE-2016-2847", "url": "https://bugzilla.suse.com/970948" }, { "category": "external", "summary": "SUSE Bug 974646 for CVE-2016-2847", "url": "https://bugzilla.suse.com/974646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2847" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3137" } ], "notes": [ { "category": "general", "text": "drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3137", "url": "https://www.suse.com/security/cve/CVE-2016-3137" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3137", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970970 for CVE-2016-3137", "url": "https://bugzilla.suse.com/970970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3137" }, { "cve": "CVE-2016-3138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3138" } ], "notes": [ { "category": "general", "text": "The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3138", "url": "https://www.suse.com/security/cve/CVE-2016-3138" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3138", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970911 for CVE-2016-3138", "url": "https://bugzilla.suse.com/970911" }, { "category": "external", "summary": "SUSE Bug 970970 for CVE-2016-3138", "url": "https://bugzilla.suse.com/970970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3138" }, { "cve": "CVE-2016-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3139" } ], "notes": [ { "category": "general", "text": "The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3139", "url": "https://www.suse.com/security/cve/CVE-2016-3139" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3139", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970909 for CVE-2016-3139", "url": "https://bugzilla.suse.com/970909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3139" }, { "cve": "CVE-2016-3140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3140" } ], "notes": [ { "category": "general", "text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3140", "url": "https://www.suse.com/security/cve/CVE-2016-3140" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3140", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970892 for CVE-2016-3140", "url": "https://bugzilla.suse.com/970892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3140" }, { "cve": "CVE-2016-3156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3156" } ], "notes": [ { "category": "general", "text": "The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3156", "url": "https://www.suse.com/security/cve/CVE-2016-3156" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3156", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971360 for CVE-2016-3156", "url": "https://bugzilla.suse.com/971360" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3156" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-4486" } ] }
suse-su-2016:0335-1
Vulnerability from csaf_suse
Published
2016-02-04 15:01
Modified
2016-02-04 15:01
Summary
Security update for kernel live patch SP1 0
Notes
Title of the patch
Security update for kernel live patch SP1 0
Description of the patch
This kernel live patch for Linux Kernel 3.12.49-11.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
Patchnames
SUSE-SLE-Live-Patching-12-2016-203
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch SP1 0", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.49-11.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-203", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0335-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0335-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160335-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0335-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001843.html" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch SP1 0", "tracking": { "current_release_date": "2016-02-04T15:01:21Z", "generator": { "date": "2016-02-04T15:01:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0335-1", "initial_release_date": "2016-02-04T15:01:21Z", "revision_history": [ { "date": "2016-02-04T15:01:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "product_id": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64", "product_id": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0354-1
Vulnerability from csaf_suse
Published
2016-02-05 16:47
Modified
2016-02-05 16:47
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (host OS panic or hang) by triggering
many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (host OS panic or hang) by triggering
many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c
(bnc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#952384, CVE-2015-7990).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on
the x86_64 platform mishandled IRET faults in processing NMIs that
occurred during userspace execution, which might allow local users to
gain privileges by triggering an NMI (bnc#937969 bnc#937970 bnc#938706
bnc#939207).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
in the Linux kernel allowed local users to cause a denial of service
(OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
kernel did not validate attempted changes to the MTU value, which allowed
context-dependent attackers to cause a denial of service (packet loss)
via a value that is (1) smaller than the minimum compliant value or
(2) larger than the MTU of an interface, as demonstrated by a Router
Advertisement (RA) message that is not validated by a daemon, a different
vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is
limited to the NetworkManager product. (bnc#955354).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c
in the Linux kernel allowed local users to cause a denial of service
(NULL pointer dereference and system crash) or possibly have unspecified
other impact by using a socket that was not properly bound (bnc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c
in the Linux kernel allowed local users to cause a denial of service
(memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers
permanent file-descriptor allocation (bnc#942367).
The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: Get rid if the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- Fixing wording in patch comment (bsc#923002)
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level (bsc#923002).
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: drop first packet to dead server (bsc#946078).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- kabi: patches.fixes/mm-make-page-pfmemalloc-check-more-robust.patch (bnc#920016).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- macvlan: Support bonding events bsc#948521
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).
- Modified -rt patches: 344 of 435, useless noise elided.
- Moved iscsi kabi patch to patches.kabi (bsc#923002)
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).
- Rename kabi patch appropriately (bsc#923002)
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SCSI: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).
- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: do not report PLC when link is in internal resume state (bnc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).
- XHCI: use uninterruptible sleep for waiting for internal operations (bnc#939955).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
Patchnames
slertesp3-kernel-rt-20151204-12390
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS\n users to cause a denial of service (host OS panic or hang) by triggering\n many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS\n users to cause a denial of service (host OS panic or hang) by triggering\n many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c\n (bnc#953527).\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#952384, CVE-2015-7990).\n- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on\n the x86_64 platform mishandled IRET faults in processing NMIs that\n occurred during userspace execution, which might allow local users to\n gain privileges by triggering an NMI (bnc#937969 bnc#937970 bnc#938706\n bnc#939207).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c\n in the Linux kernel allowed local users to cause a denial of service\n (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux\n kernel did not validate attempted changes to the MTU value, which allowed\n context-dependent attackers to cause a denial of service (packet loss)\n via a value that is (1) smaller than the minimum compliant value or\n (2) larger than the MTU of an interface, as demonstrated by a Router\n Advertisement (RA) message that is not validated by a daemon, a different\n vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is\n limited to the NetworkManager product. (bnc#955354).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c\n in the Linux kernel allowed local users to cause a denial of service\n (NULL pointer dereference and system crash) or possibly have unspecified\n other impact by using a socket that was not properly bound (bnc#945825).\n- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c\n in the Linux kernel allowed local users to cause a denial of service\n (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers\n permanent file-descriptor allocation (bnc#942367).\n\nThe following non-security bugs were fixed:\n- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- btrfs: fix hang when failing to submit bio of directIO (bnc#942688).\n- btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).\n- btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- dm-snap: avoid deadock on s-\u0026gt;lock when a read is split (bsc#939826).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).\n- drm/I915: Add enum hpd_pin to intel_encoder (bsc#942938).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).\n- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).\n- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).\n- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).\n- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).\n- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).\n- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).\n- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).\n- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).\n- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).\n- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).\n- drm/i915: fix hotplug event bit tracking (bsc#942938).\n- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).\n- drm/i915: fix hpd interrupt register locking (bsc#942938).\n- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).\n- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).\n- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).\n- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: Get rid if the \u0027hotplug_supported_mask\u0027 in struct drm_i915_private (bsc#942938).\n- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).\n- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).\n- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).\n- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).\n- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).\n- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).\n- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).\n- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).\n- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).\n- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).\n- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).\n- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).\n- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).\n- ehci-pci: enable interrupt on BayTrail (bnc926007).\n- Fixing wording in patch comment (bsc#923002)\n- fix lpfc_send_rscn_event allocation size claims bnc#935757\n- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).\n- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).\n- IB/iser: Add Discovery support (bsc#923002).\n- IB/iser: Move informational messages from error to info level (bsc#923002).\n- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).\n- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).\n- inotify: Fix nested sleeps in inotify_read() (bsc#940925).\n- ipv6: fix tunnel error handling (bsc#952579).\n- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).\n- ipvs: drop first packet to dead server (bsc#946078).\n- ipvs: Fix reuse connection if real server is dead (bnc#945827).\n- kabi: patches.fixes/mm-make-page-pfmemalloc-check-more-robust.patch (bnc#920016).\n- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).\n- ktime: add ktime_after and ktime_before helpe (bsc#904348).\n- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- lib/string.c: introduce memchr_inv() (bnc#930788).\n- macvlan: Support bonding events bsc#948521\n- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).\n- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).\n- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).\n- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).\n- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).\n- mm: make page pfmemalloc check more robust (bnc#920016).\n- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).\n- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).\n- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).\n- Modified -rt patches: 344 of 435, useless noise elided.\n- Moved iscsi kabi patch to patches.kabi (bsc#923002)\n- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).\n- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).\n- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).\n- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).\n- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).\n- PCI: delay configuration of SRIOV capability (bnc#952084).\n- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).\n- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).\n- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).\n- pktgen: clean up ktime_t helpers (bsc#904348).\n- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).\n- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).\n- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).\n- r8169: remember WOL preferences on driver load (bsc#942305).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).\n- Rename kabi patch appropriately (bsc#923002)\n- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).\n- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)\n- SCSI: kabi: allow iscsi disocvery session support (bsc#923002).\n- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- sg: fix read() error reporting (bsc#926774).\n- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.\n- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).\n- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).\n- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).\n- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).\n- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).\n- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).\n- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).\n- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).\n- xfs: add background scanning to clear eofblocks inodes (bnc#930788).\n- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).\n- xfs: add inode id filtering to eofblocks scan (bnc#930788).\n- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).\n- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).\n- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).\n- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).\n- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).\n- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).\n- xfs: support a tag-based inode_ag_iterator (bnc#930788).\n- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).\n- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).\n- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).\n- xhci: Calculate old endpoints correctly on device reset (bnc#944831).\n- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).\n- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).\n- xhci: do not report PLC when link is in internal resume state (bnc#933721).\n- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).\n- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).\n- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).\n- xhci: report U3 when link is in resume state (bnc#933721).\n- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).\n- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).\n- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).\n- XHCI: use uninterruptible sleep for waiting for internal operations (bnc#939955).\n- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp3-kernel-rt-20151204-12390", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0354-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0354-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160354-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0354-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" }, { "category": "self", "summary": "SUSE Bug 777565", "url": "https://bugzilla.suse.com/777565" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 900610", "url": "https://bugzilla.suse.com/900610" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 904965", "url": "https://bugzilla.suse.com/904965" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 923002", "url": "https://bugzilla.suse.com/923002" }, { "category": "self", "summary": "SUSE Bug 926007", "url": "https://bugzilla.suse.com/926007" }, { "category": "self", "summary": "SUSE Bug 926709", "url": "https://bugzilla.suse.com/926709" }, { "category": "self", "summary": "SUSE Bug 926774", "url": "https://bugzilla.suse.com/926774" }, { "category": "self", "summary": "SUSE Bug 930145", "url": "https://bugzilla.suse.com/930145" }, { "category": "self", "summary": "SUSE Bug 930788", "url": "https://bugzilla.suse.com/930788" }, { "category": "self", "summary": "SUSE Bug 932350", "url": "https://bugzilla.suse.com/932350" }, { "category": "self", "summary": "SUSE Bug 932805", "url": "https://bugzilla.suse.com/932805" }, { "category": "self", "summary": "SUSE Bug 933721", "url": "https://bugzilla.suse.com/933721" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 936118", "url": "https://bugzilla.suse.com/936118" }, { "category": "self", "summary": "SUSE Bug 937969", "url": "https://bugzilla.suse.com/937969" }, { "category": "self", "summary": "SUSE Bug 937970", "url": "https://bugzilla.suse.com/937970" }, { "category": "self", "summary": "SUSE Bug 938706", "url": "https://bugzilla.suse.com/938706" }, { "category": "self", "summary": "SUSE Bug 939207", "url": "https://bugzilla.suse.com/939207" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 939955", "url": "https://bugzilla.suse.com/939955" }, { "category": "self", "summary": "SUSE Bug 940017", "url": "https://bugzilla.suse.com/940017" }, { "category": "self", "summary": "SUSE Bug 940925", "url": "https://bugzilla.suse.com/940925" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 942204", "url": "https://bugzilla.suse.com/942204" }, { "category": "self", "summary": "SUSE Bug 942305", "url": "https://bugzilla.suse.com/942305" }, { "category": "self", "summary": "SUSE Bug 942367", "url": "https://bugzilla.suse.com/942367" }, { "category": "self", "summary": "SUSE Bug 942605", "url": "https://bugzilla.suse.com/942605" }, { "category": "self", "summary": "SUSE Bug 942688", "url": "https://bugzilla.suse.com/942688" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 944296", "url": "https://bugzilla.suse.com/944296" }, { "category": "self", "summary": "SUSE Bug 944831", "url": "https://bugzilla.suse.com/944831" }, { "category": "self", "summary": "SUSE Bug 944837", "url": "https://bugzilla.suse.com/944837" }, { "category": "self", "summary": "SUSE Bug 944989", "url": "https://bugzilla.suse.com/944989" }, { "category": "self", "summary": "SUSE Bug 944993", "url": "https://bugzilla.suse.com/944993" }, { "category": "self", "summary": "SUSE Bug 945691", "url": "https://bugzilla.suse.com/945691" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 945827", "url": "https://bugzilla.suse.com/945827" }, { "category": "self", "summary": "SUSE Bug 946078", "url": "https://bugzilla.suse.com/946078" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 947957", "url": "https://bugzilla.suse.com/947957" }, { "category": "self", "summary": "SUSE Bug 948330", "url": "https://bugzilla.suse.com/948330" }, { "category": "self", "summary": "SUSE Bug 948347", "url": "https://bugzilla.suse.com/948347" }, { "category": "self", "summary": "SUSE Bug 948521", "url": "https://bugzilla.suse.com/948521" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949298", "url": "https://bugzilla.suse.com/949298" }, { "category": "self", "summary": "SUSE Bug 949502", "url": "https://bugzilla.suse.com/949502" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949981", "url": "https://bugzilla.suse.com/949981" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952084", "url": "https://bugzilla.suse.com/952084" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952579", "url": "https://bugzilla.suse.com/952579" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE Bug 955354", "url": "https://bugzilla.suse.com/955354" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5157 page", "url": "https://www.suse.com/security/cve/CVE-2015-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6252 page", "url": "https://www.suse.com/security/cve/CVE-2015-6252/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-02-05T16:47:26Z", "generator": { "date": "2016-02-05T16:47:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0354-1", "initial_release_date": "2016-02-05T16:47:26Z", "revision_history": [ { "date": "2016-02-05T16:47:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5157" } ], "notes": [ { "category": "general", "text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5157", "url": "https://www.suse.com/security/cve/CVE-2015-5157" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 937969 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937969" }, { "category": "external", "summary": "SUSE Bug 937970 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937970" }, { "category": "external", "summary": "SUSE Bug 938706 for CVE-2015-5157", "url": "https://bugzilla.suse.com/938706" }, { "category": "external", "summary": "SUSE Bug 939207 for CVE-2015-5157", "url": "https://bugzilla.suse.com/939207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "important" } ], "title": "CVE-2015-5157" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6252" } ], "notes": [ { "category": "general", "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6252", "url": "https://www.suse.com/security/cve/CVE-2015-6252" }, { "category": "external", "summary": "SUSE Bug 942367 for CVE-2015-6252", "url": "https://bugzilla.suse.com/942367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-6252" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "critical" } ], "title": "CVE-2015-8104" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-8215" } ] }
suse-su-2015:2108-1
Vulnerability from csaf_suse
Published
2015-11-26 08:19
Modified
2015-11-26 08:19
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-8104: Prevent guest to host DoS caused by infinite loop in microcode via #DB exception (bsc#954404).
- CVE-2015-5307: Prevent guest to host DoS caused by infinite loop in microcode via #AC exception (bsc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bsc#938706).
- CVE-2015-7872: Possible crash when trying to garbage collect an uninstantiated keyring (bsc#951440).
- CVE-2015-0272: Prevent remote DoS using IPv6 RA with bogus MTU by validating before applying it (bsc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bsc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggered permanent file-descriptor allocation (bsc#942367).
The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bsc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bsc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bsc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bsc#942688).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm: do not start current request if it would have merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn merge heuristic (bsc#904348).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Get rid if the '^A' in struct drm_i915_private (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- fix lpfc_send_rscn_event allocation size claims bsc#935757
- hugetlb: simplify migrate_huge_page() (bsc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bsc#947957).
- ib/iser: Add Discovery support (bsc#923002).
- ib/iser: Move informational messages from error to info level (bsc#923002).
- ib/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- ib/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: Fix reuse connection if real server is dead (bsc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bsc#930788).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- macvlan: Support bonding events bsc#948521
- make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bsc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bsc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bsc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bsc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bsc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bsc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bsc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bsc#940017, bsc#949298).
- mm: make page pfmemalloc check more robust (bsc#920016).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bsc#943786).
- pci: Add dev_flags bit to access VPD through function 0 (bsc#943786).
- pci: Add flag indicating device has been assigned by KVM (bsc#777565).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bsc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bsc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bsc#952084).
- pci: delay configuration of SRIOV capability (bsc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bsc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bsc#942204).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bsc#933721).
- usb: xhci: Reset a halted endpoint immediately when we encounter a stall (bsc#933721).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bsc#944989).
- usb: xhci: do not start a halted endpoint before its new dequeue is set (bsc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bsc#933721).
- x86/tsc: Change Fast TSC calibration failed from error to info (bsc#942605).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bsc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bsc#930788).
- xfs: add background scanning to clear eofblocks inodes (bsc#930788).
- xfs: add inode id filtering to eofblocks scan (bsc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bsc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bsc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bsc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bsc#930788).
- xfs: support a tag-based inode_ag_iterator (bsc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bsc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bsc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bsc#933721).
- xhci: Calculate old endpoints correctly on device reset (bsc#944831).
- xhci: Do not enable/disable RWE on bus suspend/resume (bsc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bsc#945691).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bsc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bsc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bsc#933721).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bsc#949502).
- xhci: do not report PLC when link is in internal resume state (bsc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bsc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bsc#933721).
- xhci: report U3 when link is in resume state (bsc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bsc#933721).
- xhci: use uninterruptible sleep for waiting for internal operations (bsc#939955).
Patchnames
sdksp3-kernel-source-12226,sledsp3-kernel-source-12226,slessp3-kernel-source-12226,slexsp3-kernel-source-12226
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-8104: Prevent guest to host DoS caused by infinite loop in microcode via #DB exception (bsc#954404).\n- CVE-2015-5307: Prevent guest to host DoS caused by infinite loop in microcode via #AC exception (bsc#953527).\n- CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384).\n- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bsc#938706).\n- CVE-2015-7872: Possible crash when trying to garbage collect an uninstantiated keyring (bsc#951440).\n- CVE-2015-0272: Prevent remote DoS using IPv6 RA with bogus MTU by validating before applying it (bsc#944296).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bsc#945825).\n- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggered permanent file-descriptor allocation (bsc#942367).\n\nThe following non-security bugs were fixed:\n- alsa: hda - Disable 64bit address for Creative HDA controllers (bsc#814440).\n- btrfs: fix hang when failing to submit bio of directIO (bsc#942688).\n- btrfs: fix memory corruption on failure to submit bio for direct IO (bsc#942688).\n- btrfs: fix put dio bio twice when we submit dio bio fail (bsc#942688).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- dm-snap: avoid deadock on s-\u003elock when a read is split (bsc#939826).\n- dm: do not start current request if it would have merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn merge heuristic (bsc#904348).\n- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).\n- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).\n- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).\n- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).\n- drm/i915: Add enum hpd_pin to intel_encoder (bsc#942938).\n- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).\n- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).\n- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).\n- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).\n- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).\n- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).\n- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).\n- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).\n- drm/i915: Get rid if the \u0027^A\u0027 in struct drm_i915_private (bsc#942938).\n- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).\n- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).\n- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).\n- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).\n- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).\n- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).\n- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).\n- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).\n- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).\n- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).\n- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).\n- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).\n- drm/i915: fix hotplug event bit tracking (bsc#942938).\n- drm/i915: fix hpd interrupt register locking (bsc#942938).\n- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).\n- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).\n- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).\n- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).\n- ehci-pci: enable interrupt on BayTrail (bnc926007).\n- fix lpfc_send_rscn_event allocation size claims bsc#935757\n- hugetlb: simplify migrate_huge_page() (bsc#947957, VM Functionality).\n- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bsc#947957).\n- ib/iser: Add Discovery support (bsc#923002).\n- ib/iser: Move informational messages from error to info level (bsc#923002).\n- ib/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).\n- ib/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).\n- inotify: Fix nested sleeps in inotify_read() (bsc#940925).\n- ipv6: fix tunnel error handling (bsc#952579).\n- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).\n- ipvs: Fix reuse connection if real server is dead (bsc#945827).\n- ipvs: drop first packet to dead server (bsc#946078).\n- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).\n- ktime: add ktime_after and ktime_before helpe (bsc#904348).\n- lib/string.c: introduce memchr_inv() (bsc#930788).\n- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- macvlan: Support bonding events bsc#948521\n- make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- memory-failure: do code refactor of soft_offline_page() (bsc#947957).\n- memory-failure: fix an error of mce_bad_pages statistics (bsc#947957).\n- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bsc#947957).\n- memory-hotplug: update mce_bad_pages when removing the memory (bsc#947957).\n- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bsc#947957).\n- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bsc#947957).\n- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bsc#947957).\n- mm: exclude reserved pages from dirtyable memory 32b fix (bsc#940017, bsc#949298).\n- mm: make page pfmemalloc check more robust (bsc#920016).\n- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).\n- pci: Add VPD function 0 quirk for Intel Ethernet devices (bsc#943786).\n- pci: Add dev_flags bit to access VPD through function 0 (bsc#943786).\n- pci: Add flag indicating device has been assigned by KVM (bsc#777565).\n- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bsc#952084).\n- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bsc#952084).\n- pci: Update NumVFs register when disabling SR-IOV (bsc#952084).\n- pci: delay configuration of SRIOV capability (bsc#952084).\n- pci: set pci sriov page size before reading SRIOV BAR (bsc#952084).\n- pktgen: clean up ktime_t helpers (bsc#904348).\n- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).\n- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).\n- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).\n- r8169: remember WOL preferences on driver load (bsc#942305).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).\n- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bsc#942204).\n- scsi: hosts: update to use ida_simple for host_no (bsc#939926)\n- scsi: kabi: allow iscsi disocvery session support (bsc#923002).\n- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- sg: fix read() error reporting (bsc#926774).\n- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bsc#933721).\n- usb: xhci: Reset a halted endpoint immediately when we encounter a stall (bsc#933721).\n- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bsc#944989).\n- usb: xhci: do not start a halted endpoint before its new dequeue is set (bsc#933721).\n- usb: xhci: handle Config Error Change (CEC) in xhci driver (bsc#933721).\n- x86/tsc: Change Fast TSC calibration failed from error to info (bsc#942605).\n- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).\n- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).\n- xfs: add EOFBLOCKS inode tagging/untagging (bsc#930788).\n- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bsc#930788).\n- xfs: add background scanning to clear eofblocks inodes (bsc#930788).\n- xfs: add inode id filtering to eofblocks scan (bsc#930788).\n- xfs: add minimum file size filtering to eofblocks scan (bsc#930788).\n- xfs: create function to scan and clear EOFBLOCKS inodes (bsc#930788).\n- xfs: create helper to check whether to free eofblocks on inode (bsc#930788).\n- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).\n- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bsc#930788).\n- xfs: support a tag-based inode_ag_iterator (bsc#930788).\n- xfs: support multiple inode id filtering in eofblocks scan (bsc#930788).\n- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bsc#949981).\n- xhci: Allocate correct amount of scratchpad buffers (bsc#933721).\n- xhci: Calculate old endpoints correctly on device reset (bsc#944831).\n- xhci: Do not enable/disable RWE on bus suspend/resume (bsc#933721).\n- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bsc#945691).\n- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bsc#933721).\n- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bsc#933721).\n- xhci: Workaround for PME stuck issues in Intel xhci (bsc#933721).\n- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bsc#949502).\n- xhci: do not report PLC when link is in internal resume state (bsc#933721).\n- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bsc#944837).\n- xhci: fix reporting of 0-sized URBs in control endpoint (bsc#933721).\n- xhci: report U3 when link is in resume state (bsc#933721).\n- xhci: rework cycle bit checking for new dequeue pointers (bsc#933721).\n- xhci: use uninterruptible sleep for waiting for internal operations (bsc#939955).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-kernel-source-12226,sledsp3-kernel-source-12226,slessp3-kernel-source-12226,slexsp3-kernel-source-12226", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2108-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2108-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152108-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2108-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" }, { "category": "self", "summary": "SUSE Bug 777565", "url": "https://bugzilla.suse.com/777565" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 900610", "url": "https://bugzilla.suse.com/900610" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 904965", "url": "https://bugzilla.suse.com/904965" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 923002", "url": "https://bugzilla.suse.com/923002" }, { "category": "self", "summary": "SUSE Bug 926007", "url": "https://bugzilla.suse.com/926007" }, { "category": "self", "summary": "SUSE Bug 926709", "url": "https://bugzilla.suse.com/926709" }, { "category": "self", "summary": "SUSE Bug 926774", "url": "https://bugzilla.suse.com/926774" }, { "category": "self", "summary": "SUSE Bug 930145", "url": "https://bugzilla.suse.com/930145" }, { "category": "self", "summary": "SUSE Bug 930788", "url": "https://bugzilla.suse.com/930788" }, { "category": "self", "summary": "SUSE Bug 932350", "url": "https://bugzilla.suse.com/932350" }, { "category": "self", "summary": "SUSE Bug 932805", "url": "https://bugzilla.suse.com/932805" }, { "category": "self", "summary": "SUSE Bug 933721", "url": "https://bugzilla.suse.com/933721" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 936118", "url": "https://bugzilla.suse.com/936118" }, { "category": "self", "summary": "SUSE Bug 938706", "url": "https://bugzilla.suse.com/938706" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 939955", "url": "https://bugzilla.suse.com/939955" }, { "category": "self", "summary": "SUSE Bug 940017", "url": "https://bugzilla.suse.com/940017" }, { "category": "self", "summary": "SUSE Bug 940925", "url": "https://bugzilla.suse.com/940925" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 942204", "url": "https://bugzilla.suse.com/942204" }, { "category": "self", "summary": "SUSE Bug 942305", "url": "https://bugzilla.suse.com/942305" }, { "category": "self", "summary": "SUSE Bug 942367", "url": "https://bugzilla.suse.com/942367" }, { "category": "self", "summary": "SUSE Bug 942605", "url": "https://bugzilla.suse.com/942605" }, { "category": "self", "summary": "SUSE Bug 942688", "url": "https://bugzilla.suse.com/942688" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 944296", "url": "https://bugzilla.suse.com/944296" }, { "category": "self", "summary": "SUSE Bug 944831", "url": "https://bugzilla.suse.com/944831" }, { "category": "self", "summary": "SUSE Bug 944837", "url": "https://bugzilla.suse.com/944837" }, { "category": "self", "summary": "SUSE Bug 944989", "url": "https://bugzilla.suse.com/944989" }, { "category": "self", "summary": "SUSE Bug 944993", "url": "https://bugzilla.suse.com/944993" }, { "category": "self", "summary": "SUSE Bug 945691", "url": "https://bugzilla.suse.com/945691" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 945827", "url": "https://bugzilla.suse.com/945827" }, { "category": "self", "summary": "SUSE Bug 946078", "url": "https://bugzilla.suse.com/946078" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 947957", "url": "https://bugzilla.suse.com/947957" }, { "category": "self", "summary": "SUSE Bug 948330", "url": "https://bugzilla.suse.com/948330" }, { "category": "self", "summary": "SUSE Bug 948347", "url": "https://bugzilla.suse.com/948347" }, { "category": "self", "summary": "SUSE Bug 948521", "url": "https://bugzilla.suse.com/948521" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949298", "url": "https://bugzilla.suse.com/949298" }, { "category": "self", "summary": "SUSE Bug 949502", "url": "https://bugzilla.suse.com/949502" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949981", "url": "https://bugzilla.suse.com/949981" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952084", "url": "https://bugzilla.suse.com/952084" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952579", "url": "https://bugzilla.suse.com/952579" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5157 page", "url": "https://www.suse.com/security/cve/CVE-2015-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6252 page", "url": "https://www.suse.com/security/cve/CVE-2015-6252/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-11-26T08:19:08Z", "generator": { "date": "2015-11-26T08:19:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2108-1", "initial_release_date": "2015-11-26T08:19:08Z", "revision_history": [ { "date": "2015-11-26T08:19:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.71.1.i586", "product_id": "kernel-default-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-default-extra-3.0.101-0.47.71.1.i586", "product_id": "kernel-default-extra-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.71.1.i586", "product_id": "kernel-pae-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-extra-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-pae-extra-3.0.101-0.47.71.1.i586", "product_id": "kernel-pae-extra-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.71.1.i586", "product_id": "kernel-source-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.i586", "product_id": "kernel-syms-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.71.1.i586", "product_id": "kernel-xen-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-xen-extra-3.0.101-0.47.71.1.i586", "product_id": "kernel-xen-extra-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.71.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.i586", "product_id": "kernel-trace-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-default-3.0.101-0.47.71.1.ia64", "product_id": "kernel-default-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.ia64", "product_id": "kernel-default-base-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ia64", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-source-3.0.101-0.47.71.1.ia64", "product_id": "kernel-source-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.ia64", "product_id": "kernel-syms-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.ia64", "product_id": "kernel-trace-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ia64", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ia64", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-0.47.71.3.noarch", "product": { "name": "kernel-docs-3.0.101-0.47.71.3.noarch", "product_id": "kernel-docs-3.0.101-0.47.71.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-default-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-default-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-default-base-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-ppc64-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-source-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-source-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-syms-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-trace-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.71.1.s390x", "product_id": "kernel-default-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.71.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.71.1.s390x", "product_id": "kernel-source-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-default-extra-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-default-extra-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-0.47.71.3.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" }, "product_reference": "kernel-docs-3.0.101-0.47.71.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-extra-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-extra-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-extra-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-extra-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-extra-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5157" } ], "notes": [ { "category": "general", "text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5157", "url": "https://www.suse.com/security/cve/CVE-2015-5157" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 937969 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937969" }, { "category": "external", "summary": "SUSE Bug 937970 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937970" }, { "category": "external", "summary": "SUSE Bug 938706 for CVE-2015-5157", "url": "https://bugzilla.suse.com/938706" }, { "category": "external", "summary": "SUSE Bug 939207 for CVE-2015-5157", "url": "https://bugzilla.suse.com/939207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "important" } ], "title": "CVE-2015-5157" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6252" } ], "notes": [ { "category": "general", "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6252", "url": "https://www.suse.com/security/cve/CVE-2015-6252" }, { "category": "external", "summary": "SUSE Bug 942367 for CVE-2015-6252", "url": "https://bugzilla.suse.com/942367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-6252" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "critical" } ], "title": "CVE-2015-8104" } ] }
suse-su-2016:0380-1
Vulnerability from csaf_suse
Published
2016-02-08 13:45
Modified
2016-02-08 13:45
Summary
Security update for kernel live patch 3
Notes
Title of the patch
Security update for kernel live patch 3
Description of the patch
This kernel live patch for Linux Kernel 3.12.38-44.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-221
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 3", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.38-44.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-221", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0380-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0380-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160380-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0380-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001856.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 3", "tracking": { "current_release_date": "2016-02-08T13:45:58Z", "generator": { "date": "2016-02-08T13:45:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0380-1", "initial_release_date": "2016-02-08T13:45:58Z", "revision_history": [ { "date": "2016-02-08T13:45:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2015:2339-1
Vulnerability from csaf_suse
Published
2015-12-22 11:37
Modified
2015-12-22 11:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bnc#938706).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).
The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- Driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- Drivers: hv: do not do hypercalls when hypercall_page is NULL.
- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- Drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- Drivers: hv: vmbus: Get rid of some unused definitions.
- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- Drivers: hv: vmbus: add special crash handler (bnc#930770).
- Drivers: hv: vmbus: add special kexec handler.
- Drivers: hv: vmbus: kill tasklets on module unload.
- Drivers: hv: vmbus: prefer '^A' notification chain to 'panic'.
- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- Drivers: hv: vmbus: unregister panic notifier on module unload.
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SUNRPC refactor rpcauth_checkverf error returns (bsc#955673).
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#946214).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957,).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- memory-failure: do code refactor of soft_offline_page() (bnc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950).
- mm: remove GFP_THISNODE (bsc#954950).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS).
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984).
- s390/pci: handle events for unused functions (bnc#946214).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214).
- s390/pci: improve state check when processing hotplug events (bnc#946214).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
Patchnames
sdksp4-kernel-source-12278,sledsp4-kernel-source-12278,slessp4-kernel-source-12278,slexsp3-kernel-source-12278
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash (bsc#956709).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).\n- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).\n- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bnc#938706).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).\n\nThe following non-security bugs were fixed:\n- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- Driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).\n- Drivers: hv: do not do hypercalls when hypercall_page is NULL.\n- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.\n- Drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.\n- Drivers: hv: vmbus: Get rid of some unused definitions.\n- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.\n- Drivers: hv: vmbus: add special crash handler (bnc#930770).\n- Drivers: hv: vmbus: add special kexec handler.\n- Drivers: hv: vmbus: kill tasklets on module unload.\n- Drivers: hv: vmbus: prefer \u0027^A\u0027 notification chain to \u0027panic\u0027.\n- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().\n- Drivers: hv: vmbus: unregister panic notifier on module unload.\n- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).\n- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).\n- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).\n- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- NFSv4: Fix two infinite loops in the mount code (bsc#954628).\n- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).\n- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).\n- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).\n- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).\n- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).\n- PCI: delay configuration of SRIOV capability (bnc#952084).\n- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).\n- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)\n- SUNRPC refactor rpcauth_checkverf error returns (bsc#955673).\n- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#946214).\n- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).\n- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).\n- blktap: refine mm tracking (bsc#952976).\n- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- dm-snap: avoid deadock on s-\u003elock when a read is split (bsc#939826).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).\n- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- fix lpfc_send_rscn_event allocation size claims bnc#935757\n- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).\n- fs: Fix deadlocks between sync and fs freezing (bsc#935123).\n- hugetlb: simplify migrate_huge_page() (bnc#947957).\n- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957,).\n- ipr: Fix incorrect trace indexing (bsc#940913).\n- ipr: Fix invalid array indexing for HRRQ (bsc#940913).\n- ipv6: fix tunnel error handling (bsc#952579).\n- ipvs: Fix reuse connection if real server is dead (bnc#945827).\n- ipvs: drop first packet to dead server (bsc#946078).\n- kernel: correct uc_sigmask of the compat signal frame (bnc#946214).\n- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214).\n- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).\n- ktime: add ktime_after and ktime_before helpe (bsc#904348).\n- lib/string.c: introduce memchr_inv() (bnc#930788).\n- lpfc: Fix cq_id masking problem (bsc#944677).\n- macvlan: Support bonding events bsc#948521\n- memory-failure: do code refactor of soft_offline_page() (bnc#947957).\n- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957).\n- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957).\n- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957).\n- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957).\n- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957).\n- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957).\n- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).\n- mm: fix GFP_THISNODE callers and clarify (bsc#954950).\n- mm: remove GFP_THISNODE (bsc#954950).\n- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS).\n- net/core: Add VF link state control policy (bsc#950298).\n- netfilter: xt_recent: fix namespace destroy path (bsc#879378).\n- panic/x86: Allow cpus to save registers even if they (bnc#940946).\n- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).\n- pktgen: clean up ktime_t helpers (bsc#904348).\n- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).\n- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).\n- qla2xxx: Remove unavailable firmware files (bsc#921081).\n- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).\n- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).\n- quota: Fix deadlock with suspend and quotas (bsc#935123).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).\n- rtnetlink: Fix VF IFLA policy (bsc#950298).\n- rtnetlink: fix VF info size (bsc#950298).\n- s390/dasd: fix disconnected device with valid path mask (bnc#946214).\n- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954984).\n- s390/pci: handle events for unused functions (bnc#946214).\n- s390/pci: improve handling of hotplug event 0x301 (bnc#946214).\n- s390/pci: improve state check when processing hotplug events (bnc#946214).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- sg: fix read() error reporting (bsc#926774).\n- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).\n- usbback: correct copy length for partial transfers (bsc#941202).\n- usbvision fix overflow of interfaces array (bnc#950998).\n- veth: extend device features (bsc#879381).\n- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).\n- vmxnet3: adjust ring sizes when interface is down (bsc#950750).\n- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).\n- writeback: Skip writeback for frozen filesystem (bsc#935123).\n- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).\n- x86/evtchn: make use of PHYSDEVOP_map_pirq.\n- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).\n- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).\n- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).\n- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).\n- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).\n- xfs: add background scanning to clear eofblocks inodes (bnc#930788).\n- xfs: add inode id filtering to eofblocks scan (bnc#930788).\n- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).\n- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).\n- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).\n- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).\n- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).\n- xfs: support a tag-based inode_ag_iterator (bnc#930788).\n- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).\n- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).\n- xhci: Calculate old endpoints correctly on device reset (bnc#944831).\n- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).\n- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).\n- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).\n- xhci: silence TD warning (bnc#939955).\n- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-source-12278,sledsp4-kernel-source-12278,slessp4-kernel-source-12278,slexsp3-kernel-source-12278", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2339-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2339-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152339-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2339-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 879378", "url": "https://bugzilla.suse.com/879378" }, { "category": "self", "summary": "SUSE Bug 879381", "url": "https://bugzilla.suse.com/879381" }, { "category": "self", "summary": "SUSE Bug 900610", "url": "https://bugzilla.suse.com/900610" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 904965", "url": "https://bugzilla.suse.com/904965" }, { "category": "self", "summary": "SUSE Bug 921081", "url": "https://bugzilla.suse.com/921081" }, { "category": "self", "summary": "SUSE Bug 926774", "url": "https://bugzilla.suse.com/926774" }, { "category": "self", "summary": "SUSE Bug 930145", "url": "https://bugzilla.suse.com/930145" }, { "category": "self", "summary": "SUSE Bug 930770", "url": "https://bugzilla.suse.com/930770" }, { "category": "self", "summary": "SUSE Bug 930788", "url": "https://bugzilla.suse.com/930788" }, { "category": "self", "summary": "SUSE Bug 930835", "url": "https://bugzilla.suse.com/930835" }, { "category": "self", "summary": "SUSE Bug 932805", "url": "https://bugzilla.suse.com/932805" }, { "category": "self", "summary": "SUSE Bug 935123", "url": "https://bugzilla.suse.com/935123" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 937256", "url": "https://bugzilla.suse.com/937256" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 938706", "url": "https://bugzilla.suse.com/938706" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 939955", "url": "https://bugzilla.suse.com/939955" }, { "category": "self", "summary": "SUSE Bug 940017", "url": "https://bugzilla.suse.com/940017" }, { "category": "self", "summary": "SUSE Bug 940913", "url": "https://bugzilla.suse.com/940913" }, { "category": "self", "summary": "SUSE Bug 940946", "url": "https://bugzilla.suse.com/940946" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 944296", "url": "https://bugzilla.suse.com/944296" }, { "category": "self", "summary": "SUSE Bug 944677", "url": "https://bugzilla.suse.com/944677" }, { "category": "self", "summary": "SUSE Bug 944831", "url": "https://bugzilla.suse.com/944831" }, { "category": "self", "summary": "SUSE Bug 944837", "url": "https://bugzilla.suse.com/944837" }, { "category": "self", "summary": "SUSE Bug 944989", "url": "https://bugzilla.suse.com/944989" }, { "category": "self", "summary": "SUSE Bug 944993", "url": "https://bugzilla.suse.com/944993" }, { "category": "self", "summary": "SUSE Bug 945691", "url": "https://bugzilla.suse.com/945691" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 945827", "url": "https://bugzilla.suse.com/945827" }, { "category": "self", "summary": "SUSE Bug 946078", "url": "https://bugzilla.suse.com/946078" }, { "category": "self", "summary": "SUSE Bug 946214", "url": "https://bugzilla.suse.com/946214" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 947957", "url": "https://bugzilla.suse.com/947957" }, { "category": "self", "summary": "SUSE Bug 948330", "url": "https://bugzilla.suse.com/948330" }, { "category": "self", "summary": "SUSE Bug 948347", "url": "https://bugzilla.suse.com/948347" }, { "category": "self", "summary": "SUSE Bug 948521", "url": "https://bugzilla.suse.com/948521" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949298", "url": "https://bugzilla.suse.com/949298" }, { "category": "self", "summary": "SUSE Bug 949502", "url": "https://bugzilla.suse.com/949502" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949936", "url": "https://bugzilla.suse.com/949936" }, { "category": "self", "summary": "SUSE Bug 949981", "url": "https://bugzilla.suse.com/949981" }, { "category": "self", "summary": "SUSE Bug 950298", "url": "https://bugzilla.suse.com/950298" }, { "category": "self", "summary": "SUSE Bug 950750", "url": "https://bugzilla.suse.com/950750" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952084", "url": "https://bugzilla.suse.com/952084" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952579", "url": "https://bugzilla.suse.com/952579" }, { "category": "self", "summary": "SUSE Bug 952976", "url": "https://bugzilla.suse.com/952976" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 953799", "url": "https://bugzilla.suse.com/953799" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE Bug 954628", "url": "https://bugzilla.suse.com/954628" }, { "category": "self", "summary": "SUSE Bug 954950", "url": "https://bugzilla.suse.com/954950" }, { "category": "self", "summary": "SUSE Bug 954984", "url": "https://bugzilla.suse.com/954984" }, { "category": "self", "summary": "SUSE Bug 955673", "url": "https://bugzilla.suse.com/955673" }, { "category": "self", "summary": "SUSE Bug 956709", "url": "https://bugzilla.suse.com/956709" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5157 page", "url": "https://www.suse.com/security/cve/CVE-2015-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7509 page", "url": "https://www.suse.com/security/cve/CVE-2015-7509/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-12-22T11:37:06Z", "generator": { "date": "2015-12-22T11:37:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2339-1", "initial_release_date": "2015-12-22T11:37:06Z", "revision_history": [ { "date": "2015-12-22T11:37:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.i586", "product": { "name": "kernel-default-3.0.101-68.1.i586", "product_id": "kernel-default-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.i586", "product": { "name": "kernel-default-base-3.0.101-68.1.i586", "product_id": "kernel-default-base-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.i586", "product": { "name": "kernel-default-devel-3.0.101-68.1.i586", "product_id": "kernel-default-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-68.1.i586", "product": { "name": "kernel-default-extra-3.0.101-68.1.i586", "product_id": "kernel-default-extra-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-68.1.i586", "product": { "name": "kernel-pae-3.0.101-68.1.i586", "product_id": "kernel-pae-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-68.1.i586", "product": { "name": "kernel-pae-base-3.0.101-68.1.i586", "product_id": "kernel-pae-base-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-68.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-68.1.i586", "product_id": "kernel-pae-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-extra-3.0.101-68.1.i586", "product": { "name": "kernel-pae-extra-3.0.101-68.1.i586", "product_id": "kernel-pae-extra-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.i586", "product": { "name": "kernel-source-3.0.101-68.1.i586", "product_id": "kernel-source-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.i586", "product": { "name": "kernel-syms-3.0.101-68.1.i586", "product_id": "kernel-syms-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-68.1.i586", "product_id": "kernel-trace-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-68.1.i586", "product": { "name": "kernel-xen-3.0.101-68.1.i586", "product_id": "kernel-xen-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-68.1.i586", "product": { "name": "kernel-xen-base-3.0.101-68.1.i586", "product_id": "kernel-xen-base-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-68.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-68.1.i586", "product_id": "kernel-xen-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-68.1.i586", "product": { "name": "kernel-xen-extra-3.0.101-68.1.i586", "product_id": "kernel-xen-extra-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-68.1.i586", "product": { "name": "kernel-ec2-3.0.101-68.1.i586", "product_id": "kernel-ec2-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-68.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-68.1.i586", "product_id": "kernel-ec2-base-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-68.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-68.1.i586", "product_id": "kernel-ec2-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.i586", "product": { "name": "kernel-trace-3.0.101-68.1.i586", "product_id": "kernel-trace-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.i586", "product": { "name": "kernel-trace-base-3.0.101-68.1.i586", "product_id": "kernel-trace-base-3.0.101-68.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.ia64", "product": { "name": "kernel-default-3.0.101-68.1.ia64", "product_id": "kernel-default-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.ia64", "product": { "name": "kernel-default-base-3.0.101-68.1.ia64", "product_id": "kernel-default-base-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-68.1.ia64", "product_id": "kernel-default-devel-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.ia64", "product": { "name": "kernel-source-3.0.101-68.1.ia64", "product_id": "kernel-source-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.ia64", "product": { "name": "kernel-syms-3.0.101-68.1.ia64", "product_id": "kernel-syms-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.ia64", "product": { "name": "kernel-trace-3.0.101-68.1.ia64", "product_id": "kernel-trace-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-68.1.ia64", "product_id": "kernel-trace-base-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-68.1.ia64", "product_id": "kernel-trace-devel-3.0.101-68.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-68.2.noarch", "product": { "name": "kernel-docs-3.0.101-68.2.noarch", "product_id": "kernel-docs-3.0.101-68.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.ppc64", "product": { "name": "kernel-default-3.0.101-68.1.ppc64", "product_id": "kernel-default-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-68.1.ppc64", "product_id": "kernel-default-base-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-68.1.ppc64", "product_id": "kernel-default-devel-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-68.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-68.1.ppc64", "product_id": "kernel-ppc64-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-68.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-68.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-68.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-68.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.ppc64", "product": { "name": "kernel-source-3.0.101-68.1.ppc64", "product_id": "kernel-source-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.ppc64", "product": { "name": "kernel-syms-3.0.101-68.1.ppc64", "product_id": "kernel-syms-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.ppc64", "product": { "name": "kernel-trace-3.0.101-68.1.ppc64", "product_id": "kernel-trace-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-68.1.ppc64", "product_id": "kernel-trace-base-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-68.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-68.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.s390x", "product": { "name": "kernel-default-3.0.101-68.1.s390x", "product_id": "kernel-default-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.s390x", "product": { "name": "kernel-default-base-3.0.101-68.1.s390x", "product_id": "kernel-default-base-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-68.1.s390x", "product_id": "kernel-default-devel-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-68.1.s390x", "product": { "name": "kernel-default-man-3.0.101-68.1.s390x", "product_id": "kernel-default-man-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.s390x", "product": { "name": "kernel-source-3.0.101-68.1.s390x", "product_id": "kernel-source-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.s390x", "product": { "name": "kernel-syms-3.0.101-68.1.s390x", "product_id": "kernel-syms-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.s390x", "product": { "name": "kernel-trace-3.0.101-68.1.s390x", "product_id": "kernel-trace-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-68.1.s390x", "product_id": "kernel-trace-base-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-68.1.s390x", "product_id": "kernel-trace-devel-3.0.101-68.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.x86_64", "product": { "name": "kernel-default-3.0.101-68.1.x86_64", "product_id": "kernel-default-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-68.1.x86_64", "product_id": "kernel-default-base-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-68.1.x86_64", "product_id": "kernel-default-devel-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-68.1.x86_64", "product": { "name": "kernel-default-extra-3.0.101-68.1.x86_64", "product_id": "kernel-default-extra-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.x86_64", "product": { "name": "kernel-source-3.0.101-68.1.x86_64", "product_id": "kernel-source-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.x86_64", "product": { "name": "kernel-syms-3.0.101-68.1.x86_64", "product_id": "kernel-syms-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-68.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-68.1.x86_64", "product": { "name": "kernel-xen-3.0.101-68.1.x86_64", "product_id": "kernel-xen-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-68.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-68.1.x86_64", "product_id": "kernel-xen-base-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-68.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-68.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-68.1.x86_64", "product": { "name": "kernel-xen-extra-3.0.101-68.1.x86_64", "product_id": "kernel-xen-extra-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-68.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-68.1.x86_64", "product_id": "kernel-ec2-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-68.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-68.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-68.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-68.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.x86_64", "product": { "name": "kernel-trace-3.0.101-68.1.x86_64", "product_id": "kernel-trace-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-68.1.x86_64", "product_id": "kernel-trace-base-3.0.101-68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-68.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" }, "product_reference": "kernel-docs-3.0.101-68.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586" }, "product_reference": "kernel-default-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586" }, "product_reference": "kernel-default-extra-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-extra-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-extra-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-extra-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586" }, "product_reference": "kernel-source-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586" }, "product_reference": "kernel-syms-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-extra-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-extra-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586" }, "product_reference": "kernel-default-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586" }, "product_reference": "kernel-source-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64" }, "product_reference": "kernel-source-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64" }, "product_reference": "kernel-source-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x" }, "product_reference": "kernel-source-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586" }, "product_reference": "kernel-syms-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64" }, "product_reference": "kernel-syms-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x" }, "product_reference": "kernel-syms-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586" }, "product_reference": "kernel-default-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586" }, "product_reference": "kernel-source-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64" }, "product_reference": "kernel-source-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64" }, "product_reference": "kernel-source-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x" }, "product_reference": "kernel-source-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586" }, "product_reference": "kernel-syms-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64" }, "product_reference": "kernel-syms-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x" }, "product_reference": "kernel-syms-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5157" } ], "notes": [ { "category": "general", "text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5157", "url": "https://www.suse.com/security/cve/CVE-2015-5157" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 937969 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937969" }, { "category": "external", "summary": "SUSE Bug 937970 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937970" }, { "category": "external", "summary": "SUSE Bug 938706 for CVE-2015-5157", "url": "https://bugzilla.suse.com/938706" }, { "category": "external", "summary": "SUSE Bug 939207 for CVE-2015-5157", "url": "https://bugzilla.suse.com/939207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "important" } ], "title": "CVE-2015-5157" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7509" } ], "notes": [ { "category": "general", "text": "fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7509", "url": "https://www.suse.com/security/cve/CVE-2015-7509" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7509", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 956707 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956707" }, { "category": "external", "summary": "SUSE Bug 956709 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956709" }, { "category": "external", "summary": "SUSE Bug 956766 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "moderate" } ], "title": "CVE-2015-7509" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "critical" } ], "title": "CVE-2015-8104" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-8215" } ] }
suse-su-2016:0383-1
Vulnerability from csaf_suse
Published
2016-02-08 13:45
Modified
2016-02-08 13:45
Summary
Security update for kernel live patch 5
Notes
Title of the patch
Security update for kernel live patch 5
Description of the patch
This kernel live patch for Linux Kernel 3.12.43-52.6.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-219
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 5", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.43-52.6.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-219", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0383-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0383-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160383-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0383-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001858.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 5", "tracking": { "current_release_date": "2016-02-08T13:45:42Z", "generator": { "date": "2016-02-08T13:45:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0383-1", "initial_release_date": "2016-02-08T13:45:42Z", "revision_history": [ { "date": "2016-02-08T13:45:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0381-1
Vulnerability from csaf_suse
Published
2016-02-08 13:45
Modified
2016-02-08 13:45
Summary
Security update for kernel live patch 4
Notes
Title of the patch
Security update for kernel live patch 4
Description of the patch
This kernel live patch for Linux Kernel 3.12.39-47.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-220
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 4", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.39-47.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-220", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0381-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0381-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160381-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0381-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001857.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 4", "tracking": { "current_release_date": "2016-02-08T13:45:50Z", "generator": { "date": "2016-02-08T13:45:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0381-1", "initial_release_date": "2016-02-08T13:45:50Z", "revision_history": [ { "date": "2016-02-08T13:45:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0384-1
Vulnerability from csaf_suse
Published
2016-02-08 13:46
Modified
2016-02-08 13:46
Summary
Security update for kernel live patch 2
Notes
Title of the patch
Security update for kernel live patch 2
Description of the patch
This kernel live patch for Linux Kernel 3.12.36-38.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-224
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 2", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.36-38.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-224", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0384-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0384-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160384-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0384-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001859.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 2", "tracking": { "current_release_date": "2016-02-08T13:46:19Z", "generator": { "date": "2016-02-08T13:46:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0384-1", "initial_release_date": "2016-02-08T13:46:19Z", "revision_history": [ { "date": "2016-02-08T13:46:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
wid-sec-w-2025-1597
Vulnerability from csaf_certbund
Published
2015-09-14 22:00
Modified
2025-07-20 22:00
Summary
Linux Kernel: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "niedrig" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1597 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2015/wid-sec-w-2025-1597.json" }, { "category": "self", "summary": "WID-SEC-2025-1597 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1597" }, { "category": "external", "summary": "Eintrag auf Openwall OSS-Security vom 2015-09-14", "url": "http://www.openwall.com/lists/oss-security/2015/09/14/3" }, { "category": "external", "summary": "Debian Security Advisory DSA-3364 vom 2015-09-22", "url": "http://www.debian.org/security/2015/dsa-3364" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2015:1727-1 vom 2015-10-13", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151727-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2775-1 vom 2015-10-20", "url": "http://www.ubuntu.com/usn/usn-2775-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2773-1 vom 2015-10-20", "url": "http://www.ubuntu.com/usn/usn-2773-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2774-1 vom 2015-10-20", "url": "http://www.ubuntu.com/usn/usn-2774-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2776-1 vom 2015-10-20", "url": "http://www.ubuntu.com/usn/usn-2776-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2777-1 vom 2015-10-20", "url": "http://www.ubuntu.com/usn/usn-2777-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2779-1 vom 2015-10-20", "url": "http://www.ubuntu.com/usn/usn-2779-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2778-1 vom 2015-10-20", "url": "http://www.ubuntu.com/usn/usn-2778-1/" }, { "category": "external", "summary": "Debian Security Advisory DSA-3396 vom 2015-11-11", "url": "http://www.debian.org/security/2015/dsa-3396" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2015:2108-1 vom 2015-11-26", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152108-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2015:2339-1 vom 2015-12-22", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152339-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2015:2350-1 vom 2015-12-23", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0337-1 vom 2016-02-04", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160337-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0335-1 vom 2016-02-04", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160335-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0354-1 vom 2016-02-05", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0384-1 vom 2016-02-08", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160384-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0387-1 vom 2016-02-08", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160387-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0386-1 vom 2016-02-08", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160386-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0380-1 vom 2016-02-08", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160380-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0381-1 vom 2016-02-08", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160381-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0383-1 vom 2016-02-08", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160383-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0434-1 vom 2016-02-12", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160434-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2074 vom 2016-08-15", "url": "https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2017-3567 vom 2017-05-16", "url": "http://linux.oracle.com/errata/ELSA-2017-3567.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18", "url": "https://linux.oracle.com/errata/ELSA-2025-20480.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2025-07-20T22:00:00.000+00:00", "generator": { "date": "2025-07-21T08:21:55.426+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1597", "initial_release_date": "2015-09-14T22:00:00.000+00:00", "revision_history": [ { "date": "2015-09-14T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2015-09-14T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2015-09-21T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2015-09-21T22:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2015-10-13T22:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2015-10-19T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2015-10-19T22:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2015-10-20T22:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2015-10-20T22:00:00.000+00:00", "number": "9", "summary": "Version nicht vorhanden" }, { "date": "2015-11-10T23:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2015-11-26T23:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2015-12-22T23:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2015-12-22T23:00:00.000+00:00", "number": "13", "summary": "Version nicht vorhanden" }, { "date": "2015-12-23T23:00:00.000+00:00", "number": "14", "summary": "New remediations available" }, { "date": "2016-02-04T23:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2016-02-07T23:00:00.000+00:00", "number": "16", "summary": "New remediations available" }, { "date": "2016-02-08T23:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2016-02-14T23:00:00.000+00:00", "number": "18", "summary": "New remediations available" }, { "date": "2016-08-16T22:00:00.000+00:00", "number": "19", "summary": "New remediations available" }, { "date": "2016-09-04T22:00:00.000+00:00", "number": "20", "summary": "New remediations available" }, { "date": "2016-09-04T22:00:00.000+00:00", "number": "21", "summary": "Version nicht vorhanden" }, { "date": "2017-05-16T22:00:00.000+00:00", "number": "22", "summary": "New remediations available" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "23" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "6368", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "12.04 LTS", "product": { "name": "Ubuntu Linux 12.04 LTS", "product_id": "170497", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:12.04:-:lts" } } }, { "category": "product_version", "name": "15.04", "product": { "name": "Ubuntu Linux 15.04", "product_id": "310566", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:15.04" } } }, { "category": "product_version", "name": "14.04 LTS", "product": { "name": "Ubuntu Linux 14.04 LTS", "product_id": "T003005", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:14.04:-:lts" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-6937", "product_status": { "known_affected": [ "170497", "310566", "2951", "T002207", "6368", "T003005", "T004914" ] }, "release_date": "2015-09-14T22:00:00.000+00:00", "title": "CVE-2015-6937" } ] }
fkie_cve-2015-6937
Vulnerability from fkie_nvd
Published
2015-10-19 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f | Patch, Vendor Advisory | |
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html | Third Party Advisory | |
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html | Third Party Advisory | |
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.debian.org/security/2015/dsa-3364 | Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/09/14/3 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/76767 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1034453 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2773-1 | Third Party Advisory | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2774-1 | Third Party Advisory | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2777-1 | Third Party Advisory | |
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1263139 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3364 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/09/14/3 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/76767 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034453 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2773-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2774-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2777-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1263139 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F1B9081-FA4D-426C-B2DE-78AEA0BB6DB1", "versionEndIncluding": "4.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound." }, { "lang": "es", "value": "La funci\u00f3n __rds_conn_create en net/rds/connection.c en el kernel de Linux hasta la versi\u00f3n 4.2.3 permite a usuarios locales provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda del sistema) o posiblemente tener otro impacto no especificado mediante el uso de un socket que no estaba vinculado adecuadamente." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/476.html\" rel=\"nofollow\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e", "id": "CVE-2015-6937", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-19T10:59:07.380", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3364" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/09/14/3" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76767" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034453" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2773-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2774-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2777-1" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/09/14/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2773-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2774-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2777-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-vcw3-c24j-h6v5
Vulnerability from github
Published
2022-05-14 02:21
Modified
2022-05-14 02:21
VLAI Severity ?
Details
The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
{ "affected": [], "aliases": [ "CVE-2015-6937" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-10-19T10:59:00Z", "severity": "MODERATE" }, "details": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "id": "GHSA-vcw3-c24j-h6v5", "modified": "2022-05-14T02:21:22Z", "published": "2022-05-14T02:21:22Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6937" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3364" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2015/09/14/3" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/76767" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1034453" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2773-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2774-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2777-1" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2015-6937
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-6937", "description": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "id": "GSD-2015-6937", "references": [ "https://www.suse.com/security/cve/CVE-2015-6937.html", "https://www.debian.org/security/2015/dsa-3364", "https://ubuntu.com/security/CVE-2015-6937", "https://advisories.mageia.org/CVE-2015-6937.html", "https://linux.oracle.com/cve/CVE-2015-6937.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-6937" ], "details": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "id": "GSD-2015-6937", "modified": "2023-12-13T01:20:04.223434Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2016:0337", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2015:2350", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "name": "SUSE-SU-2016:0434", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "DSA-3364", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3364" }, { "name": "FEDORA-2015-16440", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html" }, { "name": "SUSE-SU-2015:1727", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139" }, { "name": "1034453", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034453" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "openSUSE-SU-2015:2232", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "SUSE-SU-2016:0380", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "name": "SUSE-SU-2016:0354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2016:0335", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "SUSE-SU-2015:2339", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "SUSE-SU-2015:2108", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "[oss-security] 20150914 CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/09/14/3" }, { "name": "USN-2774-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2774-1" }, { "name": "SUSE-SU-2016:0383", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "name": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "FEDORA-2015-16417", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html" }, { "name": "76767", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76767" }, { "name": "USN-2773-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2773-1" }, { "name": "SUSE-SU-2016:0386", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "name": "FEDORA-2015-16441", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "SUSE-SU-2016:2074", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "SUSE-SU-2016:0384", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "SUSE-SU-2016:0387", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "USN-2777-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2777-1" }, { "name": "SUSE-SU-2016:0381", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.2.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6937" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150914 CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/09/14/3" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263139" }, { "name": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "SUSE-SU-2016:2074", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "76767", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76767" }, { "name": "SUSE-SU-2016:0380", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "name": "SUSE-SU-2016:0386", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "name": "SUSE-SU-2016:0384", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "SUSE-SU-2016:0337", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2016:0335", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "SUSE-SU-2016:0387", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "SUSE-SU-2016:0434", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "SUSE-SU-2016:0381", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "name": "SUSE-SU-2016:0383", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "name": "SUSE-SU-2016:0354", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2015:2108", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "name": "1034453", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034453" }, { "name": "SUSE-SU-2015:2339", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "SUSE-SU-2015:2350", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "name": "USN-2777-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2777-1" }, { "name": "openSUSE-SU-2015:2232", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "FEDORA-2015-16417", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html" }, { "name": "USN-2773-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2773-1" }, { "name": "FEDORA-2015-16440", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html" }, { "name": "USN-2774-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2774-1" }, { "name": "FEDORA-2015-16441", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html" }, { "name": "SUSE-SU-2015:1727", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" }, { "name": "DSA-3364", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3364" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-17T01:29Z", "publishedDate": "2015-10-19T10:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…