Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-7990 (GCVE-0-2015-7990)
Vulnerability from cvelistv5
Published
2015-12-28 11:00
Modified
2024-08-06 08:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2015:2292", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" }, { "name": "SUSE-SU-2016:0337", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2015:2350", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437" }, { "name": "SUSE-SU-2016:0434", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "USN-2887-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2887-2" }, { "name": "[linux-kernel] 20151016 [PATCH] RDS: fix race condition when sending a message on unbound socket.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lkml.org/lkml/2015/10/16/530" }, { "name": "1034453", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034453" }, { "name": "USN-2886-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2886-1" }, { "name": "USN-2887-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2887-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=952384" }, { "name": "SUSE-SU-2015:2194", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" }, { "name": "USN-2890-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2890-3" }, { "name": "openSUSE-SU-2015:2232", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "SUSE-SU-2016:0380", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "USN-2889-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2889-1" }, { "name": "SUSE-SU-2016:0354", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2016:0335", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "SUSE-SU-2015:2339", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "SUSE-SU-2015:2108", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "name": "USN-2889-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2889-2" }, { "name": "[oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/27/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3" }, { "name": "SUSE-SU-2016:0383", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "name": "SUSE-SU-2016:0386", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "SUSE-SU-2016:2074", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "USN-2890-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2890-2" }, { "name": "77340", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/77340" }, { "name": "SUSE-SU-2016:0384", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "DSA-3396", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3396" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "USN-2890-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2890-1" }, { "name": "SUSE-SU-2016:0387", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "SUSE-SU-2016:0381", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "name": "USN-2888-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2888-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SU-2015:2292", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" }, { "name": "SUSE-SU-2016:0337", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2015:2350", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437" }, { "name": "SUSE-SU-2016:0434", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "USN-2887-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2887-2" }, { "name": "[linux-kernel] 20151016 [PATCH] RDS: fix race condition when sending a message on unbound socket.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lkml.org/lkml/2015/10/16/530" }, { "name": "1034453", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034453" }, { "name": "USN-2886-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2886-1" }, { "name": "USN-2887-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2887-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=952384" }, { "name": "SUSE-SU-2015:2194", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" }, { "name": "USN-2890-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2890-3" }, { "name": "openSUSE-SU-2015:2232", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "SUSE-SU-2016:0380", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "USN-2889-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2889-1" }, { "name": "SUSE-SU-2016:0354", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2016:0335", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "SUSE-SU-2015:2339", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "SUSE-SU-2015:2108", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "name": "USN-2889-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2889-2" }, { "name": "[oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/27/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3" }, { "name": "SUSE-SU-2016:0383", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "name": "SUSE-SU-2016:0386", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "SUSE-SU-2016:2074", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "USN-2890-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2890-2" }, { "name": "77340", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/77340" }, { "name": "SUSE-SU-2016:0384", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "DSA-3396", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3396" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "USN-2890-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2890-1" }, { "name": "SUSE-SU-2016:0387", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "SUSE-SU-2016:0381", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "name": "USN-2888-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2888-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2015:2292", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" }, { "name": "SUSE-SU-2016:0337", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2015:2350", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437" }, { "name": "SUSE-SU-2016:0434", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "USN-2887-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2887-2" }, { "name": "[linux-kernel] 20151016 [PATCH] RDS: fix race condition when sending a message on unbound socket.", "refsource": "MLIST", "url": "https://lkml.org/lkml/2015/10/16/530" }, { "name": "1034453", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034453" }, { "name": "USN-2886-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2886-1" }, { "name": "USN-2887-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2887-1" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=952384", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=952384" }, { "name": "SUSE-SU-2015:2194", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" }, { "name": "USN-2890-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2890-3" }, { "name": "openSUSE-SU-2015:2232", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "SUSE-SU-2016:0380", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "USN-2889-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2889-1" }, { "name": "SUSE-SU-2016:0354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2016:0335", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "SUSE-SU-2015:2339", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "SUSE-SU-2015:2108", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "name": "USN-2889-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2889-2" }, { "name": "[oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/10/27/5" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3" }, { "name": "SUSE-SU-2016:0383", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "name": "SUSE-SU-2016:0386", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "SUSE-SU-2016:2074", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "USN-2890-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2890-2" }, { "name": "77340", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77340" }, { "name": "SUSE-SU-2016:0384", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "DSA-3396", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3396" }, { "name": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "USN-2890-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2890-1" }, { "name": "SUSE-SU-2016:0387", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "SUSE-SU-2016:0381", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "name": "USN-2888-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2888-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7990", "datePublished": "2015-12-28T11:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-7990\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-12-28T11:59:04.200\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.\"},{\"lang\":\"es\",\"value\":\"Condici\u00f3n de carrera en la funci\u00f3n rds_sendmsg en net/rds/sendmsg.c en el kernel de Linux en versiones anteriores a 4.3.3 permite a usuarios locales provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda del sistema) o posiblemente tener otro impacto no especificado mediante el uso de un socket que no estaba vinculado adecuadamente. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2015-6937\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":5.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":4.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:C\",\"baseScore\":5.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":8.5,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.3.2\",\"matchCriteriaId\":\"17376827-DFED-4E71-8D4A-5E5C44073D57\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3396\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/10/27/5\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/77340\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1034453\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2886-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2887-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2887-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2888-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2889-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2889-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2890-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2890-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2890-3\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1276437\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=952384\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lkml.org/lkml/2015/10/16/530\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3396\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/10/27/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/77340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1034453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2886-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2887-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2887-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2888-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2889-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2889-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2890-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2890-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2890-3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1276437\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=952384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lkml.org/lkml/2015/10/16/530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2016:0386-1
Vulnerability from csaf_suse
Published
2016-02-08 13:46
Modified
2016-02-08 13:46
Summary
Security update for kernel live patch 6
Notes
Title of the patch
Security update for kernel live patch 6
Description of the patch
This kernel live patch for Linux Kernel 3.12.44-52.10.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-222
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 6", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.44-52.10.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-222", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0386-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0386-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160386-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0386-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001860.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 6", "tracking": { "current_release_date": "2016-02-08T13:46:05Z", "generator": { "date": "2016-02-08T13:46:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0386-1", "initial_release_date": "2016-02-08T13:46:05Z", "revision_history": [ { "date": "2016-02-08T13:46:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:05Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0434-1
Vulnerability from csaf_suse
Published
2016-02-11 16:46
Modified
2016-02-11 16:46
Summary
Security update for kernel live patch 1
Notes
Title of the patch
Security update for kernel live patch 1
Description of the patch
This kernel live patch for Linux Kernel 3.12.32-33.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-249
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 1", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.32-33.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-249", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0434-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0434-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160434-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0434-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001875.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 1", "tracking": { "current_release_date": "2016-02-11T16:46:47Z", "generator": { "date": "2016-02-11T16:46:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0434-1", "initial_release_date": "2016-02-11T16:46:47Z", "revision_history": [ { "date": "2016-02-11T16:46:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_32-33-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_32-33-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-11T16:46:47Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0337-1
Vulnerability from csaf_suse
Published
2016-02-04 15:01
Modified
2016-02-04 15:01
Summary
Security update for kernel live patch 8
Notes
Title of the patch
Security update for kernel live patch 8
Description of the patch
This kernel live patch for Linux Kernel 3.12.48-52.27.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-206
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 8", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.48-52.27.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-206", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0337-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0337-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160337-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0337-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001845.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 8", "tracking": { "current_release_date": "2016-02-04T15:01:47Z", "generator": { "date": "2016-02-04T15:01:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0337-1", "initial_release_date": "2016-02-04T15:01:47Z", "revision_history": [ { "date": "2016-02-04T15:01:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:47Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0387-1
Vulnerability from csaf_suse
Published
2016-02-08 13:46
Modified
2016-02-08 13:46
Summary
Security update for kernel live patch 7
Notes
Title of the patch
Security update for kernel live patch 7
Description of the patch
This kernel live patch for Linux Kernel 3.12.44-52.18.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-223
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 7", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.44-52.18.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-223", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0387-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0387-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160387-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0387-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001861.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 7", "tracking": { "current_release_date": "2016-02-08T13:46:12Z", "generator": { "date": "2016-02-08T13:46:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0387-1", "initial_release_date": "2016-02-08T13:46:12Z", "revision_history": [ { "date": "2016-02-08T13:46:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_18-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:12Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2015:2350-1
Vulnerability from csaf_suse
Published
2015-12-23 13:24
Modified
2015-12-23 13:24
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-7509: Mounting a prepared ext2 filesystem as ext4 could lead
to a local denial of service (crash) (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
the Linux kernel did not ensure that certain slot numbers are valid,
which allowed local users to cause a denial of service (NULL pointer
dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call
(bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (host OS panic or hang) by triggering
many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (host OS panic or hang) by triggering
many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c
(bnc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on
the x86_64 platform mishandled IRET faults in processing NMIs that
occurred during userspace execution, which might allow local users to
gain privileges by triggering an NMI (bnc#937969 937970 938706 939207).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
in the Linux kernel allowed local users to cause a denial of service
(OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
kernel did not validate attempted changes to the MTU value, which allowed
context-dependent attackers to cause a denial of service (packet loss)
via a value that is (1) smaller than the minimum compliant value or
(2) larger than the MTU of an interface, as demonstrated by a Router
Advertisement (RA) message that is not validated by a daemon, a different
vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is
limited to the NetworkManager product. (bnc#955354).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c
in the Linux kernel allowed local users to cause a denial of service
(NULL pointer dereference and system crash) or possibly have unspecified
other impact by using a socket that was not properly bound (bnc#945825).
The following non-security bugs were fixed:
- af_xhci: avoid path quiesce of severed path in shutdown() (bnc#946214, LTC#131684).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- drivers: hv: do not do hypercalls when hypercall_page is NULL.
- drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- drivers: hv: vmbus: add special crash handler (bnc#930770).
- drivers: hv: vmbus: add special kexec handler.
- drivers: hv: vmbus: Get rid of some unused definitions.
- drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- drivers: hv: vmbus: kill tasklets on module unload.
- drivers: hv: vmbus: prefer 'die' notification chain to 'panic'.
- drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- drivers: hv: vmbus: unregister panic notifier on module unload.
- driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- Import SP4-RT GA kabi files
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: drop first packet to dead server (bsc#946078).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214, LTC#130124).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214, LTC#132100).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950, VM Functionality).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).
- mm: remove GFP_THISNODE (bsc#954950, VM Functionality).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS (fate#304949)).
- Modified -rt patches: 343 of 434, noise elided.
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pci: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- pci: delay configuration of SRIOV capability (bnc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bnc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214, LTC#132707).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214, LTC#132706).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).
- s390/pci: handle events for unused functions (bnc#946214, LTC#130628).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214, LTC#130628).
- s390/pci: improve state check when processing hotplug events (bnc#946214, LTC#130628).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- sg: fix read() error reporting (bsc#926774).
- sunrpc: refactor rpcauth_checkverf error returns (bsc#955673).
- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
Patchnames
slertesp4-kernel-rt-20151204-12284
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-7509: Mounting a prepared ext2 filesystem as ext4 could lead\n to a local denial of service (crash) (bsc#956709).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in\n the Linux kernel did not ensure that certain slot numbers are valid,\n which allowed local users to cause a denial of service (NULL pointer\n dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call\n (bnc#949936).\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS\n users to cause a denial of service (host OS panic or hang) by triggering\n many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS\n users to cause a denial of service (host OS panic or hang) by triggering\n many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c\n (bnc#953527).\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#952384).\n- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on\n the x86_64 platform mishandled IRET faults in processing NMIs that\n occurred during userspace execution, which might allow local users to\n gain privileges by triggering an NMI (bnc#937969 937970 938706 939207).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c\n in the Linux kernel allowed local users to cause a denial of service\n (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux\n kernel did not validate attempted changes to the MTU value, which allowed\n context-dependent attackers to cause a denial of service (packet loss)\n via a value that is (1) smaller than the minimum compliant value or\n (2) larger than the MTU of an interface, as demonstrated by a Router\n Advertisement (RA) message that is not validated by a daemon, a different\n vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is\n limited to the NetworkManager product. (bnc#955354).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c\n in the Linux kernel allowed local users to cause a denial of service\n (NULL pointer dereference and system crash) or possibly have unspecified\n other impact by using a socket that was not properly bound (bnc#945825).\n\nThe following non-security bugs were fixed:\n- af_xhci: avoid path quiesce of severed path in shutdown() (bnc#946214, LTC#131684).\n- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).\n- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).\n- blktap: refine mm tracking (bsc#952976).\n- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- dm-snap: avoid deadock on s-\u0026gt;lock when a read is split (bsc#939826).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- drivers: hv: do not do hypercalls when hypercall_page is NULL.\n- drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.\n- drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.\n- drivers: hv: vmbus: add special crash handler (bnc#930770).\n- drivers: hv: vmbus: add special kexec handler.\n- drivers: hv: vmbus: Get rid of some unused definitions.\n- drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.\n- drivers: hv: vmbus: kill tasklets on module unload.\n- drivers: hv: vmbus: prefer \u0027die\u0027 notification chain to \u0027panic\u0027.\n- drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().\n- drivers: hv: vmbus: unregister panic notifier on module unload.\n- driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).\n- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).\n- fix lpfc_send_rscn_event allocation size claims bnc#935757\n- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).\n- fs: Fix deadlocks between sync and fs freezing (bsc#935123).\n- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).\n- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).\n- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).\n- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).\n- Import SP4-RT GA kabi files\n- ipr: Fix incorrect trace indexing (bsc#940913).\n- ipr: Fix invalid array indexing for HRRQ (bsc#940913).\n- ipv6: fix tunnel error handling (bsc#952579).\n- ipvs: drop first packet to dead server (bsc#946078).\n- ipvs: Fix reuse connection if real server is dead (bnc#945827).\n- kernel: correct uc_sigmask of the compat signal frame (bnc#946214, LTC#130124).\n- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214, LTC#132100).\n- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).\n- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).\n- ktime: add ktime_after and ktime_before helpe (bsc#904348).\n- lib/string.c: introduce memchr_inv() (bnc#930788).\n- lpfc: Fix cq_id masking problem (bsc#944677).\n- macvlan: Support bonding events bsc#948521\n- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).\n- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).\n- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).\n- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).\n- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).\n- mm: fix GFP_THISNODE callers and clarify (bsc#954950, VM Functionality).\n- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).\n- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).\n- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).\n- mm: remove GFP_THISNODE (bsc#954950, VM Functionality).\n- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS (fate#304949)).\n- Modified -rt patches: 343 of 434, noise elided.\n- net/core: Add VF link state control policy (bsc#950298).\n- netfilter: xt_recent: fix namespace destroy path (bsc#879378).\n- NFSv4: Fix two infinite loops in the mount code (bsc#954628).\n- panic/x86: Allow cpus to save registers even if they (bnc#940946).\n- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).\n- pci: Add dev_flags bit to access VPD through function 0 (bnc#943786).\n- pci: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).\n- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).\n- pci: delay configuration of SRIOV capability (bnc#952084).\n- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).\n- pci: set pci sriov page size before reading SRIOV BAR (bnc#952084).\n- pci: Update NumVFs register when disabling SR-IOV (bnc#952084).\n- pktgen: clean up ktime_t helpers (bsc#904348).\n- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).\n- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).\n- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).\n- qla2xxx: Remove unavailable firmware files (bsc#921081).\n- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).\n- quota: Fix deadlock with suspend and quotas (bsc#935123).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).\n- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).\n- rtnetlink: Fix VF IFLA policy (bsc#950298).\n- rtnetlink: fix VF info size (bsc#950298).\n- s390/dasd: fix disconnected device with valid path mask (bnc#946214, LTC#132707).\n- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214, LTC#132706).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).\n- s390/pci: handle events for unused functions (bnc#946214, LTC#130628).\n- s390/pci: improve handling of hotplug event 0x301 (bnc#946214, LTC#130628).\n- s390/pci: improve state check when processing hotplug events (bnc#946214, LTC#130628).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- scsi: hosts: update to use ida_simple for host_no (bsc#939926)\n- sg: fix read() error reporting (bsc#926774).\n- sunrpc: refactor rpcauth_checkverf error returns (bsc#955673).\n- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.\n- usbback: correct copy length for partial transfers (bsc#941202).\n- usbvision fix overflow of interfaces array (bnc#950998).\n- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).\n- veth: extend device features (bsc#879381).\n- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).\n- vmxnet3: adjust ring sizes when interface is down (bsc#950750).\n- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).\n- writeback: Skip writeback for frozen filesystem (bsc#935123).\n- x86/evtchn: make use of PHYSDEVOP_map_pirq.\n- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).\n- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).\n- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).\n- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).\n- xfs: add background scanning to clear eofblocks inodes (bnc#930788).\n- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).\n- xfs: add inode id filtering to eofblocks scan (bnc#930788).\n- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).\n- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).\n- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).\n- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).\n- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).\n- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).\n- xfs: support a tag-based inode_ag_iterator (bnc#930788).\n- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).\n- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).\n- xhci: Calculate old endpoints correctly on device reset (bnc#944831).\n- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).\n- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).\n- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).\n- xhci: silence TD warning (bnc#939955).\n- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-rt-20151204-12284", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2350-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2350-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152350-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2350-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 879378", "url": "https://bugzilla.suse.com/879378" }, { "category": "self", "summary": "SUSE Bug 879381", "url": "https://bugzilla.suse.com/879381" }, { "category": "self", "summary": "SUSE Bug 900610", "url": "https://bugzilla.suse.com/900610" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 904965", "url": "https://bugzilla.suse.com/904965" }, { "category": "self", "summary": "SUSE Bug 921081", "url": "https://bugzilla.suse.com/921081" }, { "category": "self", "summary": "SUSE Bug 926709", "url": "https://bugzilla.suse.com/926709" }, { "category": "self", "summary": "SUSE Bug 926774", "url": "https://bugzilla.suse.com/926774" }, { "category": "self", "summary": "SUSE Bug 930145", "url": "https://bugzilla.suse.com/930145" }, { "category": "self", "summary": "SUSE Bug 930770", "url": "https://bugzilla.suse.com/930770" }, { "category": "self", "summary": "SUSE Bug 930788", "url": "https://bugzilla.suse.com/930788" }, { "category": "self", "summary": "SUSE Bug 930835", "url": "https://bugzilla.suse.com/930835" }, { "category": "self", "summary": "SUSE Bug 932805", "url": "https://bugzilla.suse.com/932805" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935123", "url": "https://bugzilla.suse.com/935123" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 937256", "url": "https://bugzilla.suse.com/937256" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 937969", "url": "https://bugzilla.suse.com/937969" }, { "category": "self", "summary": "SUSE Bug 937970", "url": "https://bugzilla.suse.com/937970" }, { "category": "self", "summary": "SUSE Bug 938706", "url": "https://bugzilla.suse.com/938706" }, { "category": "self", "summary": "SUSE Bug 939207", "url": "https://bugzilla.suse.com/939207" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 939955", "url": "https://bugzilla.suse.com/939955" }, { "category": "self", "summary": "SUSE Bug 940017", "url": "https://bugzilla.suse.com/940017" }, { "category": "self", "summary": "SUSE Bug 940913", "url": "https://bugzilla.suse.com/940913" }, { "category": "self", "summary": "SUSE Bug 940946", "url": "https://bugzilla.suse.com/940946" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 944677", "url": "https://bugzilla.suse.com/944677" }, { "category": "self", "summary": "SUSE Bug 944831", "url": "https://bugzilla.suse.com/944831" }, { "category": "self", "summary": "SUSE Bug 944837", "url": "https://bugzilla.suse.com/944837" }, { "category": "self", "summary": "SUSE Bug 944989", "url": "https://bugzilla.suse.com/944989" }, { "category": "self", "summary": "SUSE Bug 944993", "url": "https://bugzilla.suse.com/944993" }, { "category": "self", "summary": "SUSE Bug 945691", "url": "https://bugzilla.suse.com/945691" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 945827", "url": "https://bugzilla.suse.com/945827" }, { "category": "self", "summary": "SUSE Bug 946078", "url": "https://bugzilla.suse.com/946078" }, { "category": "self", "summary": "SUSE Bug 946214", "url": "https://bugzilla.suse.com/946214" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 947957", "url": "https://bugzilla.suse.com/947957" }, { "category": "self", "summary": "SUSE Bug 948330", "url": "https://bugzilla.suse.com/948330" }, { "category": "self", "summary": "SUSE Bug 948347", "url": "https://bugzilla.suse.com/948347" }, { "category": "self", "summary": "SUSE Bug 948521", "url": "https://bugzilla.suse.com/948521" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949298", "url": "https://bugzilla.suse.com/949298" }, { "category": "self", "summary": "SUSE Bug 949502", "url": "https://bugzilla.suse.com/949502" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949936", "url": "https://bugzilla.suse.com/949936" }, { "category": "self", "summary": "SUSE Bug 949981", "url": "https://bugzilla.suse.com/949981" }, { "category": "self", "summary": "SUSE Bug 950298", "url": "https://bugzilla.suse.com/950298" }, { "category": "self", "summary": "SUSE Bug 950750", "url": "https://bugzilla.suse.com/950750" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952084", "url": "https://bugzilla.suse.com/952084" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952579", "url": "https://bugzilla.suse.com/952579" }, { "category": "self", "summary": "SUSE Bug 952976", "url": "https://bugzilla.suse.com/952976" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 953799", "url": "https://bugzilla.suse.com/953799" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE Bug 954628", "url": "https://bugzilla.suse.com/954628" }, { "category": "self", "summary": "SUSE Bug 954950", "url": "https://bugzilla.suse.com/954950" }, { "category": "self", "summary": "SUSE Bug 954984", "url": "https://bugzilla.suse.com/954984" }, { "category": "self", "summary": "SUSE Bug 955354", "url": "https://bugzilla.suse.com/955354" }, { "category": "self", "summary": "SUSE Bug 955673", "url": "https://bugzilla.suse.com/955673" }, { "category": "self", "summary": "SUSE Bug 956709", "url": "https://bugzilla.suse.com/956709" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5157 page", "url": "https://www.suse.com/security/cve/CVE-2015-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7509 page", "url": "https://www.suse.com/security/cve/CVE-2015-7509/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-12-23T13:24:50Z", "generator": { "date": "2015-12-23T13:24:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2350-1", "initial_release_date": "2015-12-23T13:24:50Z", "revision_history": [ { "date": "2015-12-23T13:24:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-48.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5157" } ], "notes": [ { "category": "general", "text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5157", "url": "https://www.suse.com/security/cve/CVE-2015-5157" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 937969 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937969" }, { "category": "external", "summary": "SUSE Bug 937970 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937970" }, { "category": "external", "summary": "SUSE Bug 938706 for CVE-2015-5157", "url": "https://bugzilla.suse.com/938706" }, { "category": "external", "summary": "SUSE Bug 939207 for CVE-2015-5157", "url": "https://bugzilla.suse.com/939207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "important" } ], "title": "CVE-2015-5157" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7509" } ], "notes": [ { "category": "general", "text": "fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7509", "url": "https://www.suse.com/security/cve/CVE-2015-7509" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7509", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 956707 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956707" }, { "category": "external", "summary": "SUSE Bug 956709 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956709" }, { "category": "external", "summary": "SUSE Bug 956766 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "moderate" } ], "title": "CVE-2015-7509" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "critical" } ], "title": "CVE-2015-8104" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-48.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-23T13:24:50Z", "details": "low" } ], "title": "CVE-2015-8215" } ] }
suse-su-2016:2074-1
Vulnerability from csaf_suse
Published
2016-08-15 10:48
Modified
2016-08-15 10:48
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP2 kernel was updated to receive various security and bug fixes.
The following security bugs were fixed:
- CVE-2016-4486: Fixed 4 byte information leak in net/core/rtnetlink.c (bsc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512).
- CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013).
- CVE-2016-2547: sound/core/timer.c in the Linux kernel employed a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011).
- CVE-2016-2548: sound/core/timer.c in the Linux kernel retained certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012).
- CVE-2016-2546: sound/core/timer.c in the Linux kernel used an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975).
- CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974).
- CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973).
- CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972).
- CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693).
- CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel .4.1 allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).
- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).
- CVE-2015-7515: The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints (bnc#956708).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).
- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015 (bnc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#952384).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation (bnc#942367).
- CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel allowed local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped (bnc#928130).
The following non-security bugs were fixed:
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- Fix lpfc_send_rscn_event allocation size claims bnc#935757
- Fix ntpd clock synchronization in Xen PV domains (bnc#816446).
- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- SCSI: bfa: Fix to handle firmware tskim abort request response (bsc#972510).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bsc#977847).
- nf_conntrack: fix bsc#758540 kabi fix (bsc#946117).
- privcmd: allow preempting long running user-mode originating hypercalls (bnc#861093).
- s390/cio: collect format 1 channel-path description data (bsc#966460, bsc#966662).
- s390/cio: ensure consistent measurement state (bsc#966460, bsc#966662).
- s390/cio: fix measurement characteristics memleak (bsc#966460, bsc#966662).
- s390/cio: update measurement characteristics (bsc#966460, bsc#966662).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
Patchnames
slessp2-kernel-source-12693
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP2 kernel was updated to receive various security and bug fixes.\n\nThe following security bugs were fixed:\n- CVE-2016-4486: Fixed 4 byte information leak in net/core/rtnetlink.c (bsc#978822).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).\n- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).\n- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).\n- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).\n- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).\n- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).\n- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512).\n- CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013).\n- CVE-2016-2547: sound/core/timer.c in the Linux kernel employed a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011).\n- CVE-2016-2548: sound/core/timer.c in the Linux kernel retained certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012).\n- CVE-2016-2546: sound/core/timer.c in the Linux kernel used an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975).\n- CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974).\n- CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973).\n- CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972).\n- CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693).\n- CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437).\n- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).\n- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel .4.1 allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).\n- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).\n- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).\n- CVE-2015-7515: The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints (bnc#956708).\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).\n- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).\n- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).\n- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).\n- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).\n- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).\n- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015 (bnc#956709).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).\n- CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#952384).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).\n- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation (bnc#942367).\n- CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel allowed local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped (bnc#928130).\n\nThe following non-security bugs were fixed:\n- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).\n- Fix lpfc_send_rscn_event allocation size claims bnc#935757\n- Fix ntpd clock synchronization in Xen PV domains (bnc#816446).\n- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).\n- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- SCSI: bfa: Fix to handle firmware tskim abort request response (bsc#972510).\n- USB: usbip: fix potential out-of-bounds write (bnc#975945).\n- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).\n- dm-snap: avoid deadock on s-\u003elock when a read is split (bsc#939826).\n- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bsc#977847).\n- nf_conntrack: fix bsc#758540 kabi fix (bsc#946117).\n- privcmd: allow preempting long running user-mode originating hypercalls (bnc#861093).\n- s390/cio: collect format 1 channel-path description data (bsc#966460, bsc#966662).\n- s390/cio: ensure consistent measurement state (bsc#966460, bsc#966662).\n- s390/cio: fix measurement characteristics memleak (bsc#966460, bsc#966662).\n- s390/cio: update measurement characteristics (bsc#966460, bsc#966662).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-kernel-source-12693", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2074-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2074-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162074-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2074-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" }, { "category": "self", "summary": "SUSE Bug 816446", "url": "https://bugzilla.suse.com/816446" }, { "category": "self", "summary": "SUSE Bug 861093", "url": "https://bugzilla.suse.com/861093" }, { "category": "self", "summary": "SUSE Bug 928130", "url": "https://bugzilla.suse.com/928130" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 942367", "url": "https://bugzilla.suse.com/942367" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 946117", "url": "https://bugzilla.suse.com/946117" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 948562", "url": "https://bugzilla.suse.com/948562" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949936", "url": "https://bugzilla.suse.com/949936" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE Bug 955354", "url": "https://bugzilla.suse.com/955354" }, { "category": "self", "summary": "SUSE Bug 955654", "url": "https://bugzilla.suse.com/955654" }, { "category": "self", "summary": "SUSE Bug 956708", "url": "https://bugzilla.suse.com/956708" }, { "category": "self", "summary": "SUSE Bug 956709", "url": "https://bugzilla.suse.com/956709" }, { "category": "self", "summary": "SUSE Bug 958463", "url": "https://bugzilla.suse.com/958463" }, { "category": "self", "summary": "SUSE Bug 958886", "url": "https://bugzilla.suse.com/958886" }, { "category": "self", "summary": "SUSE Bug 958951", "url": "https://bugzilla.suse.com/958951" }, { "category": "self", "summary": "SUSE Bug 959190", "url": "https://bugzilla.suse.com/959190" }, { "category": "self", "summary": "SUSE Bug 959399", "url": "https://bugzilla.suse.com/959399" }, { "category": "self", "summary": "SUSE Bug 961500", "url": "https://bugzilla.suse.com/961500" }, { "category": "self", "summary": "SUSE Bug 961509", "url": "https://bugzilla.suse.com/961509" }, { "category": "self", "summary": "SUSE Bug 961512", "url": "https://bugzilla.suse.com/961512" }, { "category": "self", "summary": "SUSE Bug 963765", "url": "https://bugzilla.suse.com/963765" }, { "category": "self", "summary": "SUSE Bug 963767", "url": "https://bugzilla.suse.com/963767" }, { "category": "self", "summary": "SUSE Bug 964201", "url": "https://bugzilla.suse.com/964201" }, { "category": "self", "summary": "SUSE Bug 966437", "url": "https://bugzilla.suse.com/966437" }, { "category": "self", "summary": "SUSE Bug 966460", "url": "https://bugzilla.suse.com/966460" }, { "category": "self", "summary": "SUSE Bug 966662", "url": "https://bugzilla.suse.com/966662" }, { "category": "self", "summary": "SUSE Bug 966693", "url": "https://bugzilla.suse.com/966693" }, { "category": "self", "summary": "SUSE Bug 967972", "url": "https://bugzilla.suse.com/967972" }, { "category": "self", "summary": "SUSE Bug 967973", "url": "https://bugzilla.suse.com/967973" }, { "category": "self", "summary": "SUSE Bug 967974", "url": "https://bugzilla.suse.com/967974" }, { "category": "self", "summary": "SUSE Bug 967975", "url": "https://bugzilla.suse.com/967975" }, { "category": "self", "summary": "SUSE Bug 968010", "url": "https://bugzilla.suse.com/968010" }, { "category": "self", "summary": "SUSE Bug 968011", "url": "https://bugzilla.suse.com/968011" }, { "category": "self", "summary": "SUSE Bug 968012", "url": "https://bugzilla.suse.com/968012" }, { "category": "self", "summary": "SUSE Bug 968013", "url": "https://bugzilla.suse.com/968013" }, { "category": "self", "summary": "SUSE Bug 968670", "url": "https://bugzilla.suse.com/968670" }, { "category": "self", "summary": "SUSE Bug 970504", "url": "https://bugzilla.suse.com/970504" }, { "category": "self", "summary": "SUSE Bug 970892", "url": "https://bugzilla.suse.com/970892" }, { "category": "self", "summary": "SUSE Bug 970909", "url": "https://bugzilla.suse.com/970909" }, { "category": "self", "summary": "SUSE Bug 970911", "url": "https://bugzilla.suse.com/970911" }, { "category": "self", "summary": "SUSE Bug 970948", "url": "https://bugzilla.suse.com/970948" }, { "category": "self", "summary": "SUSE Bug 970956", "url": "https://bugzilla.suse.com/970956" }, { "category": "self", "summary": "SUSE Bug 970958", "url": "https://bugzilla.suse.com/970958" }, { "category": "self", "summary": "SUSE Bug 970970", "url": "https://bugzilla.suse.com/970970" }, { "category": "self", "summary": "SUSE Bug 971124", "url": "https://bugzilla.suse.com/971124" }, { "category": "self", "summary": "SUSE Bug 971125", "url": "https://bugzilla.suse.com/971125" }, { "category": "self", "summary": "SUSE Bug 971126", "url": "https://bugzilla.suse.com/971126" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 972510", "url": "https://bugzilla.suse.com/972510" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 975945", "url": "https://bugzilla.suse.com/975945" }, { "category": "self", "summary": "SUSE Bug 977847", "url": "https://bugzilla.suse.com/977847" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2015 page", "url": "https://www.suse.com/security/cve/CVE-2013-2015/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3339 page", "url": "https://www.suse.com/security/cve/CVE-2015-3339/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6252 page", "url": "https://www.suse.com/security/cve/CVE-2015-6252/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7509 page", "url": "https://www.suse.com/security/cve/CVE-2015-7509/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7515 page", "url": "https://www.suse.com/security/cve/CVE-2015-7515/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7550 page", "url": "https://www.suse.com/security/cve/CVE-2015-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7566 page", "url": "https://www.suse.com/security/cve/CVE-2015-7566/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8543 page", "url": "https://www.suse.com/security/cve/CVE-2015-8543/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8569 page", "url": "https://www.suse.com/security/cve/CVE-2015-8569/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8575 page", "url": "https://www.suse.com/security/cve/CVE-2015-8575/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8767 page", "url": "https://www.suse.com/security/cve/CVE-2015-8767/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8785 page", "url": "https://www.suse.com/security/cve/CVE-2015-8785/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8812 page", "url": "https://www.suse.com/security/cve/CVE-2015-8812/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0723 page", "url": "https://www.suse.com/security/cve/CVE-2016-0723/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2069 page", "url": "https://www.suse.com/security/cve/CVE-2016-2069/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2143 page", "url": "https://www.suse.com/security/cve/CVE-2016-2143/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2184 page", "url": "https://www.suse.com/security/cve/CVE-2016-2184/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2185 page", "url": "https://www.suse.com/security/cve/CVE-2016-2185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2186 page", "url": "https://www.suse.com/security/cve/CVE-2016-2186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2188 page", "url": "https://www.suse.com/security/cve/CVE-2016-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2384 page", "url": "https://www.suse.com/security/cve/CVE-2016-2384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2543 page", "url": "https://www.suse.com/security/cve/CVE-2016-2543/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2544 page", "url": "https://www.suse.com/security/cve/CVE-2016-2544/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2545 page", "url": "https://www.suse.com/security/cve/CVE-2016-2545/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2546 page", "url": "https://www.suse.com/security/cve/CVE-2016-2546/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2547 page", "url": "https://www.suse.com/security/cve/CVE-2016-2547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2548 page", "url": "https://www.suse.com/security/cve/CVE-2016-2548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2549 page", "url": "https://www.suse.com/security/cve/CVE-2016-2549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2782 page", "url": "https://www.suse.com/security/cve/CVE-2016-2782/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2847 page", "url": "https://www.suse.com/security/cve/CVE-2016-2847/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3137 page", "url": "https://www.suse.com/security/cve/CVE-2016-3137/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3138 page", "url": "https://www.suse.com/security/cve/CVE-2016-3138/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3139 page", "url": "https://www.suse.com/security/cve/CVE-2016-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3140 page", "url": "https://www.suse.com/security/cve/CVE-2016-3140/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3156 page", "url": "https://www.suse.com/security/cve/CVE-2016-3156/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-08-15T10:48:57Z", "generator": { "date": "2016-08-15T10:48:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2074-1", "initial_release_date": "2016-08-15T10:48:57Z", "revision_history": [ { "date": "2016-08-15T10:48:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-default-3.0.101-0.7.40.1.i586", "product_id": "kernel-default-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-default-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-default-devel-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.7.40.1.i586", "product_id": "kernel-ec2-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-pae-3.0.101-0.7.40.1.i586", "product_id": "kernel-pae-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-pae-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-source-3.0.101-0.7.40.1.i586", "product_id": "kernel-source-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-syms-3.0.101-0.7.40.1.i586", "product_id": "kernel-syms-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-trace-3.0.101-0.7.40.1.i586", "product_id": "kernel-trace-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-trace-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-xen-3.0.101-0.7.40.1.i586", "product_id": "kernel-xen-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.7.40.1.i586", "product_id": "kernel-xen-base-3.0.101-0.7.40.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.40.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.7.40.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.7.40.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-default-3.0.101-0.7.40.1.s390x", "product_id": "kernel-default-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.7.40.1.s390x", "product_id": "kernel-default-base-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.7.40.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.7.40.1.s390x", "product_id": "kernel-default-man-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-source-3.0.101-0.7.40.1.s390x", "product_id": "kernel-source-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.7.40.1.s390x", "product_id": "kernel-syms-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.7.40.1.s390x", "product_id": "kernel-trace-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.7.40.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.7.40.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.40.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.7.40.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-default-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-source-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-syms-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-trace-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-xen-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.7.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-default-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-source-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.40.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2015", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2015" } ], "notes": [ { "category": "general", "text": "The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable media, as demonstrated by the e2fsprogs tests/f_orphan_extents_inode/image.gz test.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2015", "url": "https://www.suse.com/security/cve/CVE-2013-2015" }, { "category": "external", "summary": "SUSE Bug 817377 for CVE-2013-2015", "url": "https://bugzilla.suse.com/817377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2013-2015" }, { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-3339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3339" } ], "notes": [ { "category": "general", "text": "Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3339", "url": "https://www.suse.com/security/cve/CVE-2015-3339" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-3339", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 928130 for CVE-2015-3339", "url": "https://bugzilla.suse.com/928130" }, { "category": "external", "summary": "SUSE Bug 939263 for CVE-2015-3339", "url": "https://bugzilla.suse.com/939263" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-3339" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6252" } ], "notes": [ { "category": "general", "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6252", "url": "https://www.suse.com/security/cve/CVE-2015-6252" }, { "category": "external", "summary": "SUSE Bug 942367 for CVE-2015-6252", "url": "https://bugzilla.suse.com/942367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-6252" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7509" } ], "notes": [ { "category": "general", "text": "fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7509", "url": "https://www.suse.com/security/cve/CVE-2015-7509" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7509", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 956707 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956707" }, { "category": "external", "summary": "SUSE Bug 956709 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956709" }, { "category": "external", "summary": "SUSE Bug 956766 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-7509" }, { "cve": "CVE-2015-7515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7515" } ], "notes": [ { "category": "general", "text": "The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7515", "url": "https://www.suse.com/security/cve/CVE-2015-7515" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7515", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 956708 for CVE-2015-7515", "url": "https://bugzilla.suse.com/956708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-7515" }, { "cve": "CVE-2015-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7550" } ], "notes": [ { "category": "general", "text": "The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7550", "url": "https://www.suse.com/security/cve/CVE-2015-7550" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 958951 for CVE-2015-7550", "url": "https://bugzilla.suse.com/958951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-7550" }, { "cve": "CVE-2015-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7566" } ], "notes": [ { "category": "general", "text": "The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7566", "url": "https://www.suse.com/security/cve/CVE-2015-7566" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7566", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961512 for CVE-2015-7566", "url": "https://bugzilla.suse.com/961512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-7566" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "critical" } ], "title": "CVE-2015-8104" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8215" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "important" } ], "title": "CVE-2015-8539" }, { "cve": "CVE-2015-8543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8543" } ], "notes": [ { "category": "general", "text": "The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8543", "url": "https://www.suse.com/security/cve/CVE-2015-8543" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8543", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8543", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8543", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8543", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 958886 for CVE-2015-8543", "url": "https://bugzilla.suse.com/958886" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8543", "url": "https://bugzilla.suse.com/963994" }, { "category": "external", "summary": "SUSE Bug 969522 for CVE-2015-8543", "url": "https://bugzilla.suse.com/969522" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-8543" }, { "cve": "CVE-2015-8569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8569" } ], "notes": [ { "category": "general", "text": "The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8569", "url": "https://www.suse.com/security/cve/CVE-2015-8569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8569", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 959190 for CVE-2015-8569", "url": "https://bugzilla.suse.com/959190" }, { "category": "external", "summary": "SUSE Bug 959399 for CVE-2015-8569", "url": "https://bugzilla.suse.com/959399" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8569", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8569" }, { "cve": "CVE-2015-8575", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8575" } ], "notes": [ { "category": "general", "text": "The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8575", "url": "https://www.suse.com/security/cve/CVE-2015-8575" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8575", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 959190 for CVE-2015-8575", "url": "https://bugzilla.suse.com/959190" }, { "category": "external", "summary": "SUSE Bug 959399 for CVE-2015-8575", "url": "https://bugzilla.suse.com/959399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8575" }, { "cve": "CVE-2015-8767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8767" } ], "notes": [ { "category": "general", "text": "net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8767", "url": "https://www.suse.com/security/cve/CVE-2015-8767" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8767", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8767", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 961509 for CVE-2015-8767", "url": "https://bugzilla.suse.com/961509" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8767" }, { "cve": "CVE-2015-8785", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8785" } ], "notes": [ { "category": "general", "text": "The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8785", "url": "https://www.suse.com/security/cve/CVE-2015-8785" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8785", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963765 for CVE-2015-8785", "url": "https://bugzilla.suse.com/963765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8785" }, { "cve": "CVE-2015-8812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8812" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8812", "url": "https://www.suse.com/security/cve/CVE-2015-8812" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8812", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8812", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 966437 for CVE-2015-8812", "url": "https://bugzilla.suse.com/966437" }, { "category": "external", "summary": "SUSE Bug 966683 for CVE-2015-8812", "url": "https://bugzilla.suse.com/966683" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2015-8812" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0723" } ], "notes": [ { "category": "general", "text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0723", "url": "https://www.suse.com/security/cve/CVE-2016-0723" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0723", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961500 for CVE-2016-0723", "url": "https://bugzilla.suse.com/961500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-0723" }, { "cve": "CVE-2016-2069", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2069" } ], "notes": [ { "category": "general", "text": "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2069", "url": "https://www.suse.com/security/cve/CVE-2016-2069" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-2069", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 963767 for CVE-2016-2069", "url": "https://bugzilla.suse.com/963767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2069" }, { "cve": "CVE-2016-2143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2143" } ], "notes": [ { "category": "general", "text": "The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2143", "url": "https://www.suse.com/security/cve/CVE-2016-2143" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2143", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 970504 for CVE-2016-2143", "url": "https://bugzilla.suse.com/970504" }, { "category": "external", "summary": "SUSE Bug 993872 for CVE-2016-2143", "url": "https://bugzilla.suse.com/993872" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "important" } ], "title": "CVE-2016-2143" }, { "cve": "CVE-2016-2184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2184" } ], "notes": [ { "category": "general", "text": "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2184", "url": "https://www.suse.com/security/cve/CVE-2016-2184" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2184", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971125 for CVE-2016-2184", "url": "https://bugzilla.suse.com/971125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2184" }, { "cve": "CVE-2016-2185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2185" } ], "notes": [ { "category": "general", "text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2185", "url": "https://www.suse.com/security/cve/CVE-2016-2185" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2185", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971124 for CVE-2016-2185", "url": "https://bugzilla.suse.com/971124" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2185" }, { "cve": "CVE-2016-2186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2186" } ], "notes": [ { "category": "general", "text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2186", "url": "https://www.suse.com/security/cve/CVE-2016-2186" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2186", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970958 for CVE-2016-2186", "url": "https://bugzilla.suse.com/970958" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2186" }, { "cve": "CVE-2016-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2188" } ], "notes": [ { "category": "general", "text": "The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2188", "url": "https://www.suse.com/security/cve/CVE-2016-2188" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1067912 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1067912" }, { "category": "external", "summary": "SUSE Bug 1132190 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1132190" }, { "category": "external", "summary": "SUSE Bug 970956 for CVE-2016-2188", "url": "https://bugzilla.suse.com/970956" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2188" }, { "cve": "CVE-2016-2384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2384" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2384", "url": "https://www.suse.com/security/cve/CVE-2016-2384" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2384", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 966693 for CVE-2016-2384", "url": "https://bugzilla.suse.com/966693" }, { "category": "external", "summary": "SUSE Bug 967773 for CVE-2016-2384", "url": "https://bugzilla.suse.com/967773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2384" }, { "cve": "CVE-2016-2543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2543" } ], "notes": [ { "category": "general", "text": "The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2543", "url": "https://www.suse.com/security/cve/CVE-2016-2543" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2543", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 967972 for CVE-2016-2543", "url": "https://bugzilla.suse.com/967972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2543" }, { "cve": "CVE-2016-2544", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2544" } ], "notes": [ { "category": "general", "text": "Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel before 4.4.1 allows local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2544", "url": "https://www.suse.com/security/cve/CVE-2016-2544" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2544", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 967973 for CVE-2016-2544", "url": "https://bugzilla.suse.com/967973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2544" }, { "cve": "CVE-2016-2545", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2545" } ], "notes": [ { "category": "general", "text": "The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel before 4.4.1 does not properly maintain a certain linked list, which allows local users to cause a denial of service (race condition and system crash) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2545", "url": "https://www.suse.com/security/cve/CVE-2016-2545" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2545", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 967974 for CVE-2016-2545", "url": "https://bugzilla.suse.com/967974" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2545" }, { "cve": "CVE-2016-2546", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2546" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2546", "url": "https://www.suse.com/security/cve/CVE-2016-2546" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2546", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 967975 for CVE-2016-2546", "url": "https://bugzilla.suse.com/967975" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2546" }, { "cve": "CVE-2016-2547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2547" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2547", "url": "https://www.suse.com/security/cve/CVE-2016-2547" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2547", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968011 for CVE-2016-2547", "url": "https://bugzilla.suse.com/968011" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2547" }, { "cve": "CVE-2016-2548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2548" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2548", "url": "https://www.suse.com/security/cve/CVE-2016-2548" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2548", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968012 for CVE-2016-2548", "url": "https://bugzilla.suse.com/968012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2548" }, { "cve": "CVE-2016-2549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2549" } ], "notes": [ { "category": "general", "text": "sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent recursive callback access, which allows local users to cause a denial of service (deadlock) via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2549", "url": "https://www.suse.com/security/cve/CVE-2016-2549" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2549", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968013 for CVE-2016-2549", "url": "https://bugzilla.suse.com/968013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2549" }, { "cve": "CVE-2016-2782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2782" } ], "notes": [ { "category": "general", "text": "The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2782", "url": "https://www.suse.com/security/cve/CVE-2016-2782" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2782", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961512 for CVE-2016-2782", "url": "https://bugzilla.suse.com/961512" }, { "category": "external", "summary": "SUSE Bug 968670 for CVE-2016-2782", "url": "https://bugzilla.suse.com/968670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "moderate" } ], "title": "CVE-2016-2782" }, { "cve": "CVE-2016-2847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2847" } ], "notes": [ { "category": "general", "text": "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2847", "url": "https://www.suse.com/security/cve/CVE-2016-2847" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2847", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970948 for CVE-2016-2847", "url": "https://bugzilla.suse.com/970948" }, { "category": "external", "summary": "SUSE Bug 974646 for CVE-2016-2847", "url": "https://bugzilla.suse.com/974646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-2847" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3137" } ], "notes": [ { "category": "general", "text": "drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3137", "url": "https://www.suse.com/security/cve/CVE-2016-3137" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3137", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970970 for CVE-2016-3137", "url": "https://bugzilla.suse.com/970970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3137" }, { "cve": "CVE-2016-3138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3138" } ], "notes": [ { "category": "general", "text": "The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3138", "url": "https://www.suse.com/security/cve/CVE-2016-3138" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3138", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970911 for CVE-2016-3138", "url": "https://bugzilla.suse.com/970911" }, { "category": "external", "summary": "SUSE Bug 970970 for CVE-2016-3138", "url": "https://bugzilla.suse.com/970970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3138" }, { "cve": "CVE-2016-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3139" } ], "notes": [ { "category": "general", "text": "The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3139", "url": "https://www.suse.com/security/cve/CVE-2016-3139" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3139", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970909 for CVE-2016-3139", "url": "https://bugzilla.suse.com/970909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3139" }, { "cve": "CVE-2016-3140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3140" } ], "notes": [ { "category": "general", "text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3140", "url": "https://www.suse.com/security/cve/CVE-2016-3140" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3140", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970892 for CVE-2016-3140", "url": "https://bugzilla.suse.com/970892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3140" }, { "cve": "CVE-2016-3156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3156" } ], "notes": [ { "category": "general", "text": "The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3156", "url": "https://www.suse.com/security/cve/CVE-2016-3156" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3156", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971360 for CVE-2016-3156", "url": "https://bugzilla.suse.com/971360" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-3156" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-15T10:48:57Z", "details": "low" } ], "title": "CVE-2016-4486" } ] }
suse-su-2016:0335-1
Vulnerability from csaf_suse
Published
2016-02-04 15:01
Modified
2016-02-04 15:01
Summary
Security update for kernel live patch SP1 0
Notes
Title of the patch
Security update for kernel live patch SP1 0
Description of the patch
This kernel live patch for Linux Kernel 3.12.49-11.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
Patchnames
SUSE-SLE-Live-Patching-12-2016-203
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch SP1 0", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.49-11.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-203", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0335-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0335-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160335-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0335-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001843.html" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch SP1 0", "tracking": { "current_release_date": "2016-02-04T15:01:21Z", "generator": { "date": "2016-02-04T15:01:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0335-1", "initial_release_date": "2016-02-04T15:01:21Z", "revision_history": [ { "date": "2016-02-04T15:01:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "product_id": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64", "product_id": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-xen-2-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-2-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-04T15:01:21Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0354-1
Vulnerability from csaf_suse
Published
2016-02-05 16:47
Modified
2016-02-05 16:47
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (host OS panic or hang) by triggering
many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (host OS panic or hang) by triggering
many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c
(bnc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#952384, CVE-2015-7990).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on
the x86_64 platform mishandled IRET faults in processing NMIs that
occurred during userspace execution, which might allow local users to
gain privileges by triggering an NMI (bnc#937969 bnc#937970 bnc#938706
bnc#939207).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
in the Linux kernel allowed local users to cause a denial of service
(OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
kernel did not validate attempted changes to the MTU value, which allowed
context-dependent attackers to cause a denial of service (packet loss)
via a value that is (1) smaller than the minimum compliant value or
(2) larger than the MTU of an interface, as demonstrated by a Router
Advertisement (RA) message that is not validated by a daemon, a different
vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is
limited to the NetworkManager product. (bnc#955354).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c
in the Linux kernel allowed local users to cause a denial of service
(NULL pointer dereference and system crash) or possibly have unspecified
other impact by using a socket that was not properly bound (bnc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c
in the Linux kernel allowed local users to cause a denial of service
(memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers
permanent file-descriptor allocation (bnc#942367).
The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: Get rid if the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- Fixing wording in patch comment (bsc#923002)
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level (bsc#923002).
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: drop first packet to dead server (bsc#946078).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- kabi: patches.fixes/mm-make-page-pfmemalloc-check-more-robust.patch (bnc#920016).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- macvlan: Support bonding events bsc#948521
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).
- Modified -rt patches: 344 of 435, useless noise elided.
- Moved iscsi kabi patch to patches.kabi (bsc#923002)
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).
- Rename kabi patch appropriately (bsc#923002)
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SCSI: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).
- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: do not report PLC when link is in internal resume state (bnc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).
- XHCI: use uninterruptible sleep for waiting for internal operations (bnc#939955).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
Patchnames
slertesp3-kernel-rt-20151204-12390
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS\n users to cause a denial of service (host OS panic or hang) by triggering\n many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS\n users to cause a denial of service (host OS panic or hang) by triggering\n many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c\n (bnc#953527).\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#952384, CVE-2015-7990).\n- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on\n the x86_64 platform mishandled IRET faults in processing NMIs that\n occurred during userspace execution, which might allow local users to\n gain privileges by triggering an NMI (bnc#937969 bnc#937970 bnc#938706\n bnc#939207).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c\n in the Linux kernel allowed local users to cause a denial of service\n (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux\n kernel did not validate attempted changes to the MTU value, which allowed\n context-dependent attackers to cause a denial of service (packet loss)\n via a value that is (1) smaller than the minimum compliant value or\n (2) larger than the MTU of an interface, as demonstrated by a Router\n Advertisement (RA) message that is not validated by a daemon, a different\n vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is\n limited to the NetworkManager product. (bnc#955354).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c\n in the Linux kernel allowed local users to cause a denial of service\n (NULL pointer dereference and system crash) or possibly have unspecified\n other impact by using a socket that was not properly bound (bnc#945825).\n- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c\n in the Linux kernel allowed local users to cause a denial of service\n (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers\n permanent file-descriptor allocation (bnc#942367).\n\nThe following non-security bugs were fixed:\n- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- btrfs: fix hang when failing to submit bio of directIO (bnc#942688).\n- btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).\n- btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- dm-snap: avoid deadock on s-\u0026gt;lock when a read is split (bsc#939826).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).\n- drm/I915: Add enum hpd_pin to intel_encoder (bsc#942938).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).\n- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).\n- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).\n- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).\n- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).\n- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).\n- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).\n- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).\n- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).\n- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).\n- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).\n- drm/i915: fix hotplug event bit tracking (bsc#942938).\n- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).\n- drm/i915: fix hpd interrupt register locking (bsc#942938).\n- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).\n- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).\n- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).\n- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: Get rid if the \u0027hotplug_supported_mask\u0027 in struct drm_i915_private (bsc#942938).\n- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).\n- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).\n- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).\n- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).\n- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).\n- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).\n- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).\n- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).\n- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).\n- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).\n- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).\n- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).\n- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).\n- ehci-pci: enable interrupt on BayTrail (bnc926007).\n- Fixing wording in patch comment (bsc#923002)\n- fix lpfc_send_rscn_event allocation size claims bnc#935757\n- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).\n- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).\n- IB/iser: Add Discovery support (bsc#923002).\n- IB/iser: Move informational messages from error to info level (bsc#923002).\n- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).\n- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).\n- inotify: Fix nested sleeps in inotify_read() (bsc#940925).\n- ipv6: fix tunnel error handling (bsc#952579).\n- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).\n- ipvs: drop first packet to dead server (bsc#946078).\n- ipvs: Fix reuse connection if real server is dead (bnc#945827).\n- kabi: patches.fixes/mm-make-page-pfmemalloc-check-more-robust.patch (bnc#920016).\n- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).\n- ktime: add ktime_after and ktime_before helpe (bsc#904348).\n- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- lib/string.c: introduce memchr_inv() (bnc#930788).\n- macvlan: Support bonding events bsc#948521\n- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).\n- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).\n- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).\n- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).\n- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).\n- mm: make page pfmemalloc check more robust (bnc#920016).\n- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).\n- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).\n- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).\n- Modified -rt patches: 344 of 435, useless noise elided.\n- Moved iscsi kabi patch to patches.kabi (bsc#923002)\n- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).\n- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).\n- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).\n- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).\n- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).\n- PCI: delay configuration of SRIOV capability (bnc#952084).\n- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).\n- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).\n- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).\n- pktgen: clean up ktime_t helpers (bsc#904348).\n- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).\n- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).\n- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).\n- r8169: remember WOL preferences on driver load (bsc#942305).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).\n- Rename kabi patch appropriately (bsc#923002)\n- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).\n- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)\n- SCSI: kabi: allow iscsi disocvery session support (bsc#923002).\n- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- sg: fix read() error reporting (bsc#926774).\n- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.\n- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).\n- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).\n- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).\n- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).\n- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).\n- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).\n- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).\n- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).\n- xfs: add background scanning to clear eofblocks inodes (bnc#930788).\n- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).\n- xfs: add inode id filtering to eofblocks scan (bnc#930788).\n- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).\n- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).\n- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).\n- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).\n- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).\n- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).\n- xfs: support a tag-based inode_ag_iterator (bnc#930788).\n- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).\n- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).\n- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).\n- xhci: Calculate old endpoints correctly on device reset (bnc#944831).\n- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).\n- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).\n- xhci: do not report PLC when link is in internal resume state (bnc#933721).\n- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).\n- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).\n- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).\n- xhci: report U3 when link is in resume state (bnc#933721).\n- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).\n- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).\n- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).\n- XHCI: use uninterruptible sleep for waiting for internal operations (bnc#939955).\n- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp3-kernel-rt-20151204-12390", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0354-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0354-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160354-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0354-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" }, { "category": "self", "summary": "SUSE Bug 777565", "url": "https://bugzilla.suse.com/777565" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 900610", "url": "https://bugzilla.suse.com/900610" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 904965", "url": "https://bugzilla.suse.com/904965" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 923002", "url": "https://bugzilla.suse.com/923002" }, { "category": "self", "summary": "SUSE Bug 926007", "url": "https://bugzilla.suse.com/926007" }, { "category": "self", "summary": "SUSE Bug 926709", "url": "https://bugzilla.suse.com/926709" }, { "category": "self", "summary": "SUSE Bug 926774", "url": "https://bugzilla.suse.com/926774" }, { "category": "self", "summary": "SUSE Bug 930145", "url": "https://bugzilla.suse.com/930145" }, { "category": "self", "summary": "SUSE Bug 930788", "url": "https://bugzilla.suse.com/930788" }, { "category": "self", "summary": "SUSE Bug 932350", "url": "https://bugzilla.suse.com/932350" }, { "category": "self", "summary": "SUSE Bug 932805", "url": "https://bugzilla.suse.com/932805" }, { "category": "self", "summary": "SUSE Bug 933721", "url": "https://bugzilla.suse.com/933721" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 936118", "url": "https://bugzilla.suse.com/936118" }, { "category": "self", "summary": "SUSE Bug 937969", "url": "https://bugzilla.suse.com/937969" }, { "category": "self", "summary": "SUSE Bug 937970", "url": "https://bugzilla.suse.com/937970" }, { "category": "self", "summary": "SUSE Bug 938706", "url": "https://bugzilla.suse.com/938706" }, { "category": "self", "summary": "SUSE Bug 939207", "url": "https://bugzilla.suse.com/939207" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 939955", "url": "https://bugzilla.suse.com/939955" }, { "category": "self", "summary": "SUSE Bug 940017", "url": "https://bugzilla.suse.com/940017" }, { "category": "self", "summary": "SUSE Bug 940925", "url": "https://bugzilla.suse.com/940925" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 942204", "url": "https://bugzilla.suse.com/942204" }, { "category": "self", "summary": "SUSE Bug 942305", "url": "https://bugzilla.suse.com/942305" }, { "category": "self", "summary": "SUSE Bug 942367", "url": "https://bugzilla.suse.com/942367" }, { "category": "self", "summary": "SUSE Bug 942605", "url": "https://bugzilla.suse.com/942605" }, { "category": "self", "summary": "SUSE Bug 942688", "url": "https://bugzilla.suse.com/942688" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 944296", "url": "https://bugzilla.suse.com/944296" }, { "category": "self", "summary": "SUSE Bug 944831", "url": "https://bugzilla.suse.com/944831" }, { "category": "self", "summary": "SUSE Bug 944837", "url": "https://bugzilla.suse.com/944837" }, { "category": "self", "summary": "SUSE Bug 944989", "url": "https://bugzilla.suse.com/944989" }, { "category": "self", "summary": "SUSE Bug 944993", "url": "https://bugzilla.suse.com/944993" }, { "category": "self", "summary": "SUSE Bug 945691", "url": "https://bugzilla.suse.com/945691" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 945827", "url": "https://bugzilla.suse.com/945827" }, { "category": "self", "summary": "SUSE Bug 946078", "url": "https://bugzilla.suse.com/946078" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 947957", "url": "https://bugzilla.suse.com/947957" }, { "category": "self", "summary": "SUSE Bug 948330", "url": "https://bugzilla.suse.com/948330" }, { "category": "self", "summary": "SUSE Bug 948347", "url": "https://bugzilla.suse.com/948347" }, { "category": "self", "summary": "SUSE Bug 948521", "url": "https://bugzilla.suse.com/948521" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949298", "url": "https://bugzilla.suse.com/949298" }, { "category": "self", "summary": "SUSE Bug 949502", "url": "https://bugzilla.suse.com/949502" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949981", "url": "https://bugzilla.suse.com/949981" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952084", "url": "https://bugzilla.suse.com/952084" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952579", "url": "https://bugzilla.suse.com/952579" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE Bug 955354", "url": "https://bugzilla.suse.com/955354" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5157 page", "url": "https://www.suse.com/security/cve/CVE-2015-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6252 page", "url": "https://www.suse.com/security/cve/CVE-2015-6252/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-02-05T16:47:26Z", "generator": { "date": "2016-02-05T16:47:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0354-1", "initial_release_date": "2016-02-05T16:47:26Z", "revision_history": [ { "date": "2016-02-05T16:47:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3", "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5157" } ], "notes": [ { "category": "general", "text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5157", "url": "https://www.suse.com/security/cve/CVE-2015-5157" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 937969 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937969" }, { "category": "external", "summary": "SUSE Bug 937970 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937970" }, { "category": "external", "summary": "SUSE Bug 938706 for CVE-2015-5157", "url": "https://bugzilla.suse.com/938706" }, { "category": "external", "summary": "SUSE Bug 939207 for CVE-2015-5157", "url": "https://bugzilla.suse.com/939207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "important" } ], "title": "CVE-2015-5157" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6252" } ], "notes": [ { "category": "general", "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6252", "url": "https://www.suse.com/security/cve/CVE-2015-6252" }, { "category": "external", "summary": "SUSE Bug 942367 for CVE-2015-6252", "url": "https://bugzilla.suse.com/942367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-6252" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "critical" } ], "title": "CVE-2015-8104" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.33.44.2.x86_64", "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.33.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-05T16:47:26Z", "details": "low" } ], "title": "CVE-2015-8215" } ] }
suse-su-2015:2108-1
Vulnerability from csaf_suse
Published
2015-11-26 08:19
Modified
2015-11-26 08:19
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-8104: Prevent guest to host DoS caused by infinite loop in microcode via #DB exception (bsc#954404).
- CVE-2015-5307: Prevent guest to host DoS caused by infinite loop in microcode via #AC exception (bsc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bsc#938706).
- CVE-2015-7872: Possible crash when trying to garbage collect an uninstantiated keyring (bsc#951440).
- CVE-2015-0272: Prevent remote DoS using IPv6 RA with bogus MTU by validating before applying it (bsc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bsc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggered permanent file-descriptor allocation (bsc#942367).
The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bsc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bsc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bsc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bsc#942688).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm: do not start current request if it would have merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn merge heuristic (bsc#904348).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Get rid if the '^A' in struct drm_i915_private (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- fix lpfc_send_rscn_event allocation size claims bsc#935757
- hugetlb: simplify migrate_huge_page() (bsc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bsc#947957).
- ib/iser: Add Discovery support (bsc#923002).
- ib/iser: Move informational messages from error to info level (bsc#923002).
- ib/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- ib/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: Fix reuse connection if real server is dead (bsc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bsc#930788).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- macvlan: Support bonding events bsc#948521
- make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bsc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bsc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bsc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bsc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bsc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bsc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bsc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bsc#940017, bsc#949298).
- mm: make page pfmemalloc check more robust (bsc#920016).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bsc#943786).
- pci: Add dev_flags bit to access VPD through function 0 (bsc#943786).
- pci: Add flag indicating device has been assigned by KVM (bsc#777565).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bsc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bsc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bsc#952084).
- pci: delay configuration of SRIOV capability (bsc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bsc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bsc#942204).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bsc#933721).
- usb: xhci: Reset a halted endpoint immediately when we encounter a stall (bsc#933721).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bsc#944989).
- usb: xhci: do not start a halted endpoint before its new dequeue is set (bsc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bsc#933721).
- x86/tsc: Change Fast TSC calibration failed from error to info (bsc#942605).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bsc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bsc#930788).
- xfs: add background scanning to clear eofblocks inodes (bsc#930788).
- xfs: add inode id filtering to eofblocks scan (bsc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bsc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bsc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bsc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bsc#930788).
- xfs: support a tag-based inode_ag_iterator (bsc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bsc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bsc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bsc#933721).
- xhci: Calculate old endpoints correctly on device reset (bsc#944831).
- xhci: Do not enable/disable RWE on bus suspend/resume (bsc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bsc#945691).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bsc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bsc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bsc#933721).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bsc#949502).
- xhci: do not report PLC when link is in internal resume state (bsc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bsc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bsc#933721).
- xhci: report U3 when link is in resume state (bsc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bsc#933721).
- xhci: use uninterruptible sleep for waiting for internal operations (bsc#939955).
Patchnames
sdksp3-kernel-source-12226,sledsp3-kernel-source-12226,slessp3-kernel-source-12226,slexsp3-kernel-source-12226
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-8104: Prevent guest to host DoS caused by infinite loop in microcode via #DB exception (bsc#954404).\n- CVE-2015-5307: Prevent guest to host DoS caused by infinite loop in microcode via #AC exception (bsc#953527).\n- CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384).\n- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bsc#938706).\n- CVE-2015-7872: Possible crash when trying to garbage collect an uninstantiated keyring (bsc#951440).\n- CVE-2015-0272: Prevent remote DoS using IPv6 RA with bogus MTU by validating before applying it (bsc#944296).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bsc#945825).\n- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggered permanent file-descriptor allocation (bsc#942367).\n\nThe following non-security bugs were fixed:\n- alsa: hda - Disable 64bit address for Creative HDA controllers (bsc#814440).\n- btrfs: fix hang when failing to submit bio of directIO (bsc#942688).\n- btrfs: fix memory corruption on failure to submit bio for direct IO (bsc#942688).\n- btrfs: fix put dio bio twice when we submit dio bio fail (bsc#942688).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- dm-snap: avoid deadock on s-\u003elock when a read is split (bsc#939826).\n- dm: do not start current request if it would have merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn merge heuristic (bsc#904348).\n- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).\n- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).\n- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).\n- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).\n- drm/i915: Add enum hpd_pin to intel_encoder (bsc#942938).\n- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).\n- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).\n- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).\n- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).\n- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).\n- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).\n- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).\n- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).\n- drm/i915: Get rid if the \u0027^A\u0027 in struct drm_i915_private (bsc#942938).\n- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).\n- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).\n- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).\n- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).\n- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).\n- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).\n- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).\n- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).\n- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).\n- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).\n- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).\n- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).\n- drm/i915: fix hotplug event bit tracking (bsc#942938).\n- drm/i915: fix hpd interrupt register locking (bsc#942938).\n- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).\n- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).\n- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).\n- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).\n- ehci-pci: enable interrupt on BayTrail (bnc926007).\n- fix lpfc_send_rscn_event allocation size claims bsc#935757\n- hugetlb: simplify migrate_huge_page() (bsc#947957, VM Functionality).\n- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bsc#947957).\n- ib/iser: Add Discovery support (bsc#923002).\n- ib/iser: Move informational messages from error to info level (bsc#923002).\n- ib/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).\n- ib/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).\n- inotify: Fix nested sleeps in inotify_read() (bsc#940925).\n- ipv6: fix tunnel error handling (bsc#952579).\n- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).\n- ipvs: Fix reuse connection if real server is dead (bsc#945827).\n- ipvs: drop first packet to dead server (bsc#946078).\n- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).\n- ktime: add ktime_after and ktime_before helpe (bsc#904348).\n- lib/string.c: introduce memchr_inv() (bsc#930788).\n- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- macvlan: Support bonding events bsc#948521\n- make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- memory-failure: do code refactor of soft_offline_page() (bsc#947957).\n- memory-failure: fix an error of mce_bad_pages statistics (bsc#947957).\n- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bsc#947957).\n- memory-hotplug: update mce_bad_pages when removing the memory (bsc#947957).\n- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bsc#947957).\n- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bsc#947957).\n- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bsc#947957).\n- mm: exclude reserved pages from dirtyable memory 32b fix (bsc#940017, bsc#949298).\n- mm: make page pfmemalloc check more robust (bsc#920016).\n- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).\n- pci: Add VPD function 0 quirk for Intel Ethernet devices (bsc#943786).\n- pci: Add dev_flags bit to access VPD through function 0 (bsc#943786).\n- pci: Add flag indicating device has been assigned by KVM (bsc#777565).\n- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bsc#952084).\n- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bsc#952084).\n- pci: Update NumVFs register when disabling SR-IOV (bsc#952084).\n- pci: delay configuration of SRIOV capability (bsc#952084).\n- pci: set pci sriov page size before reading SRIOV BAR (bsc#952084).\n- pktgen: clean up ktime_t helpers (bsc#904348).\n- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).\n- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).\n- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).\n- r8169: remember WOL preferences on driver load (bsc#942305).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).\n- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bsc#942204).\n- scsi: hosts: update to use ida_simple for host_no (bsc#939926)\n- scsi: kabi: allow iscsi disocvery session support (bsc#923002).\n- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).\n- sg: fix read() error reporting (bsc#926774).\n- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bsc#933721).\n- usb: xhci: Reset a halted endpoint immediately when we encounter a stall (bsc#933721).\n- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bsc#944989).\n- usb: xhci: do not start a halted endpoint before its new dequeue is set (bsc#933721).\n- usb: xhci: handle Config Error Change (CEC) in xhci driver (bsc#933721).\n- x86/tsc: Change Fast TSC calibration failed from error to info (bsc#942605).\n- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).\n- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).\n- xfs: add EOFBLOCKS inode tagging/untagging (bsc#930788).\n- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bsc#930788).\n- xfs: add background scanning to clear eofblocks inodes (bsc#930788).\n- xfs: add inode id filtering to eofblocks scan (bsc#930788).\n- xfs: add minimum file size filtering to eofblocks scan (bsc#930788).\n- xfs: create function to scan and clear EOFBLOCKS inodes (bsc#930788).\n- xfs: create helper to check whether to free eofblocks on inode (bsc#930788).\n- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).\n- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bsc#930788).\n- xfs: support a tag-based inode_ag_iterator (bsc#930788).\n- xfs: support multiple inode id filtering in eofblocks scan (bsc#930788).\n- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bsc#949981).\n- xhci: Allocate correct amount of scratchpad buffers (bsc#933721).\n- xhci: Calculate old endpoints correctly on device reset (bsc#944831).\n- xhci: Do not enable/disable RWE on bus suspend/resume (bsc#933721).\n- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bsc#945691).\n- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bsc#933721).\n- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bsc#933721).\n- xhci: Workaround for PME stuck issues in Intel xhci (bsc#933721).\n- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bsc#949502).\n- xhci: do not report PLC when link is in internal resume state (bsc#933721).\n- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bsc#944837).\n- xhci: fix reporting of 0-sized URBs in control endpoint (bsc#933721).\n- xhci: report U3 when link is in resume state (bsc#933721).\n- xhci: rework cycle bit checking for new dequeue pointers (bsc#933721).\n- xhci: use uninterruptible sleep for waiting for internal operations (bsc#939955).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-kernel-source-12226,sledsp3-kernel-source-12226,slessp3-kernel-source-12226,slexsp3-kernel-source-12226", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2108-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2108-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152108-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2108-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" }, { "category": "self", "summary": "SUSE Bug 777565", "url": "https://bugzilla.suse.com/777565" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 900610", "url": "https://bugzilla.suse.com/900610" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 904965", "url": "https://bugzilla.suse.com/904965" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 923002", "url": "https://bugzilla.suse.com/923002" }, { "category": "self", "summary": "SUSE Bug 926007", "url": "https://bugzilla.suse.com/926007" }, { "category": "self", "summary": "SUSE Bug 926709", "url": "https://bugzilla.suse.com/926709" }, { "category": "self", "summary": "SUSE Bug 926774", "url": "https://bugzilla.suse.com/926774" }, { "category": "self", "summary": "SUSE Bug 930145", "url": "https://bugzilla.suse.com/930145" }, { "category": "self", "summary": "SUSE Bug 930788", "url": "https://bugzilla.suse.com/930788" }, { "category": "self", "summary": "SUSE Bug 932350", "url": "https://bugzilla.suse.com/932350" }, { "category": "self", "summary": "SUSE Bug 932805", "url": "https://bugzilla.suse.com/932805" }, { "category": "self", "summary": "SUSE Bug 933721", "url": "https://bugzilla.suse.com/933721" }, { "category": "self", "summary": "SUSE Bug 935053", "url": "https://bugzilla.suse.com/935053" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 936118", "url": "https://bugzilla.suse.com/936118" }, { "category": "self", "summary": "SUSE Bug 938706", "url": "https://bugzilla.suse.com/938706" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 939955", "url": "https://bugzilla.suse.com/939955" }, { "category": "self", "summary": "SUSE Bug 940017", "url": "https://bugzilla.suse.com/940017" }, { "category": "self", "summary": "SUSE Bug 940925", "url": "https://bugzilla.suse.com/940925" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 942204", "url": "https://bugzilla.suse.com/942204" }, { "category": "self", "summary": "SUSE Bug 942305", "url": "https://bugzilla.suse.com/942305" }, { "category": "self", "summary": "SUSE Bug 942367", "url": "https://bugzilla.suse.com/942367" }, { "category": "self", "summary": "SUSE Bug 942605", "url": "https://bugzilla.suse.com/942605" }, { "category": "self", "summary": "SUSE Bug 942688", "url": "https://bugzilla.suse.com/942688" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 944296", "url": "https://bugzilla.suse.com/944296" }, { "category": "self", "summary": "SUSE Bug 944831", "url": "https://bugzilla.suse.com/944831" }, { "category": "self", "summary": "SUSE Bug 944837", "url": "https://bugzilla.suse.com/944837" }, { "category": "self", "summary": "SUSE Bug 944989", "url": "https://bugzilla.suse.com/944989" }, { "category": "self", "summary": "SUSE Bug 944993", "url": "https://bugzilla.suse.com/944993" }, { "category": "self", "summary": "SUSE Bug 945691", "url": "https://bugzilla.suse.com/945691" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 945827", "url": "https://bugzilla.suse.com/945827" }, { "category": "self", "summary": "SUSE Bug 946078", "url": "https://bugzilla.suse.com/946078" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 947957", "url": "https://bugzilla.suse.com/947957" }, { "category": "self", "summary": "SUSE Bug 948330", "url": "https://bugzilla.suse.com/948330" }, { "category": "self", "summary": "SUSE Bug 948347", "url": "https://bugzilla.suse.com/948347" }, { "category": "self", "summary": "SUSE Bug 948521", "url": "https://bugzilla.suse.com/948521" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949298", "url": "https://bugzilla.suse.com/949298" }, { "category": "self", "summary": "SUSE Bug 949502", "url": "https://bugzilla.suse.com/949502" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949981", "url": "https://bugzilla.suse.com/949981" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952084", "url": "https://bugzilla.suse.com/952084" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952579", "url": "https://bugzilla.suse.com/952579" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5157 page", "url": "https://www.suse.com/security/cve/CVE-2015-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6252 page", "url": "https://www.suse.com/security/cve/CVE-2015-6252/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-11-26T08:19:08Z", "generator": { "date": "2015-11-26T08:19:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2108-1", "initial_release_date": "2015-11-26T08:19:08Z", "revision_history": [ { "date": "2015-11-26T08:19:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.71.1.i586", "product_id": "kernel-default-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-default-extra-3.0.101-0.47.71.1.i586", "product_id": "kernel-default-extra-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.71.1.i586", "product_id": "kernel-pae-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-extra-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-pae-extra-3.0.101-0.47.71.1.i586", "product_id": "kernel-pae-extra-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.71.1.i586", "product_id": "kernel-source-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.i586", "product_id": "kernel-syms-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.71.1.i586", "product_id": "kernel-xen-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-xen-extra-3.0.101-0.47.71.1.i586", "product_id": "kernel-xen-extra-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.71.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.i586", "product_id": "kernel-trace-3.0.101-0.47.71.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-default-3.0.101-0.47.71.1.ia64", "product_id": "kernel-default-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.ia64", "product_id": "kernel-default-base-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ia64", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-source-3.0.101-0.47.71.1.ia64", "product_id": "kernel-source-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.ia64", "product_id": "kernel-syms-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.ia64", "product_id": "kernel-trace-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ia64", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ia64", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-0.47.71.3.noarch", "product": { "name": "kernel-docs-3.0.101-0.47.71.3.noarch", "product_id": "kernel-docs-3.0.101-0.47.71.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-default-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-default-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-default-base-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-ppc64-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-source-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-source-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-syms-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-trace-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.71.1.s390x", "product_id": "kernel-default-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.71.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.71.1.s390x", "product_id": "kernel-source-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-default-extra-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-default-extra-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.71.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.71.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.71.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-0.47.71.3.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" }, "product_reference": "kernel-docs-3.0.101-0.47.71.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-extra-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-extra-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-extra-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-extra-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-extra-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5157" } ], "notes": [ { "category": "general", "text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5157", "url": "https://www.suse.com/security/cve/CVE-2015-5157" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 937969 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937969" }, { "category": "external", "summary": "SUSE Bug 937970 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937970" }, { "category": "external", "summary": "SUSE Bug 938706 for CVE-2015-5157", "url": "https://bugzilla.suse.com/938706" }, { "category": "external", "summary": "SUSE Bug 939207 for CVE-2015-5157", "url": "https://bugzilla.suse.com/939207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "important" } ], "title": "CVE-2015-5157" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6252" } ], "notes": [ { "category": "general", "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6252", "url": "https://www.suse.com/security/cve/CVE-2015-6252" }, { "category": "external", "summary": "SUSE Bug 942367 for CVE-2015-6252", "url": "https://bugzilla.suse.com/942367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-6252" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-default-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-pae-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kernel-xen-extra-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-default-man-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ec2-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-pae-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-ppc64-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-source-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-syms-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-trace-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-base-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kernel-xen-devel-3.0.101-0.47.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:kernel-docs-3.0.101-0.47.71.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-11-26T08:19:08Z", "details": "critical" } ], "title": "CVE-2015-8104" } ] }
suse-su-2015:2292-1
Vulnerability from csaf_suse
Published
2015-12-17 12:08
Modified
2015-12-17 12:08
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.51 to receive
various security and bugfixes.
Following features were added:
- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).
Following security bugs were fixed:
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
kernel did not validate attempted changes to the MTU value, which allowed
context-dependent attackers to cause a denial of service (packet loss)
via a value that is (1) smaller than the minimum compliant value or
(2) larger than the MTU of an interface, as demonstrated by a Router
Advertisement (RA) message that is not validated by a daemon, a different
vulnerability than CVE-2015-0272. (bsc#955354)
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c in
the Linux kernel attempted to support a FRAGLIST feature without proper
memory allocation, which allowed guest OS users to cause a denial of
service (buffer overflow and memory corruption) via a crafted sequence
of fragmented packets (bnc#940776).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
in the Linux kernel allowed local users to cause a denial of service
(OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
the Linux kernel did not ensure that certain slot numbers are valid,
which allowed local users to cause a denial of service (NULL
pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl
call (bnc#949936).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#926238).
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#952384).
The following non-security bugs were fixed:
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#954986, LTC#131684).
- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).
- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).
- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).
- audit: correctly record file names with different path name types (bsc#950013).
- audit: create private file name copies when auditing inodes (bsc#950013).
- bcache: Add btree_insert_node() (bnc#951638).
- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).
- bcache: backing device set to clean after finishing detach (bsc#951638).
- bcache: backing device set to clean after finishing detach (bsc#951638).
- bcache: Clean up keylist code (bnc#951638).
- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).
- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).
- bcache: Explicitly track btree node's parent (bnc#951638).
- bcache: Fix a bug when detaching (bsc#951638).
- bcache: Fix a lockdep splat in an error path (bnc#951638).
- bcache: Fix a shutdown bug (bsc#951638).
- bcache: Fix more early shutdown bugs (bsc#951638).
- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- bcache: Insert multiple keys at a time (bnc#951638).
- bcache: kill closure locking usage (bnc#951638).
- bcache: Refactor journalling flow control (bnc#951638).
- bcache: Refactor request_write() (bnc#951638).
- bcache: Use blkdev_issue_discard() (bnc#951638).
- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).
- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).
- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).
- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).
- btrfs: fix condition of commit transaction (bsc#958647).
- btrfs: fix condition of commit transaction (bsc#958647).
- btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053).
- btrfs: Fix out-of-space bug (bsc#958647).
- btrfs: Fix out-of-space bug (bsc#958647).
- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).
- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).
- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).
- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).
- btrfs: fix truncation of compressed and inlined extents (bnc#956053).
- btrfs: Set relative data on clear btrfs_block_group_cache->pinned (bsc#958647).
- btrfs: Set relative data on clear btrfs_block_group_cache->pinned (bsc#958647).
- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).
- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).
- cache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#957395).
- cxgb4i: Increased the value of MAX_IMM_TX_PKT_LEN from 128 to 256 bytes (bsc#950580).
- dlm: make posix locks interruptible, (bsc#947241).
- dmapi: Fix xfs dmapi to not unlock & lock XFS_ILOCK_EXCL (bsc#949744).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- drm: Allocate new master object when client becomes master (bsc#956876, bsc#956801).
- drm: Fix KABI of 'struct drm_file' (bsc#956876, bsc#956801).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: clean up backlight conditional build (bsc#941113).
- drm/i915: debug print on backlight register (bsc#941113).
- drm/i915: do full backlight setup at enable time (bsc#941113).
- drm/i915: do not save/restore backlight registers in KMS (bsc#941113).
- drm/i915: Eliminate lots of WARNs when there's no backlight present (bsc#941113).
- drm/i915: fix gen2-gen3 backlight set (bsc#941113,bsc#953971).
- drm/i915: Fix gen3 self-refresh watermarks (bsc#953830,bsc#953971).
- drm/i915: Fix missing backlight update during panel disablement (bsc#941113).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- drm/i915: gather backlight information at setup (bsc#941113).
- drm/i915: handle backlight through chip specific functions (bsc#941113).
- drm/i915: Ignore 'digital output' and 'not HDMI output' bits for eDP detection (bsc#949192).
- drm/i915: make asle notifications update backlight on all connectors (bsc#941113).
- drm/i915: make backlight info per-connector (bsc#941113).
- drm/i915: move backlight level setting in enable/disable to hooks (bsc#941113).
- drm/i915: move opregion asle request handling to a work queue (bsc#953826).
- drm/i915: nuke get max backlight functions (bsc#941113).
- drm/i915/opregion: fix build error on CONFIG_ACPI=n (bsc#953826).
- drm/i915: restore backlight precision when converting from ACPI (bsc#941113).
- drm/i915/tv: add ->get_config callback (bsc#953830).
- drm/i915: use backlight legacy combination mode also for i915gm/i945gm (bsc#941113).
- drm/i915: use the initialized backlight max value instead of reading it (bsc#941113).
- drm/i915: vlv does not have pipe field in backlight registers (bsc#941113).
- fanotify: fix notification of groups with inode & mount marks (bsc#955533).
- Fix remove_and_add_spares removes drive added as spare in slot_store (bsc#956717).
- genksyms: Handle string literals with spaces in reference files (bsc#958510).
- genksyms: Handle string literals with spaces in reference files (bsc#958510).
- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).
in the non-RT kernel to minimize the differences.
- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).
- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).
- ixgbe: fix broken PFC with X550 (bsc#951864).
- ixgbe: use correct fcoe ddp max check (bsc#951864).
- kabi: Fix spurious kabi change in mm/util.c.
- kABI: protect struct ahci_host_priv.
- kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635).
- kabi: Restore kabi in struct se_cmd (bsc#954635).
- kabi: Restore kabi in struct se_subsystem_api (bsc#954635).
- ktime: add ktime_after and ktime_before helper (bsc#904348).
- mm: factor commit limit calculation (VM Performance).
- mm: get rid of 'vmalloc_info' from /proc/meminfo (VM Performance).
- mm: hugetlbfs: skip shared VMAs when unmapping private pages to satisfy a fault (Automatic NUMA Balancing (fate#315482)).
- mm: remove PG_waiters from PAGE_FLAGS_CHECK_AT_FREE (bnc#943959).
- mm: vmscan: never isolate more pages than necessary (VM Performance).
- Move ktime_after patch to the networking section
- nfsrdma: Fix regression in NFSRDMA server (bsc#951110).
- pci: Drop 'setting latency timer' messages (bsc#956047).
- pci: Update VPD size with correct length (bsc#924493).
- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).
- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).
- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).
- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).
- pm, hinernate: use put_page in release_swap_writer (bnc#943959).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- Re-add copy_page_vector_to_user()
- ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711).
- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).
- rpm/constraints.in: Require 14GB worth of disk space on POWER The builds started to fail randomly due to ENOSPC errors.
- rpm/kernel-binary.spec.in: Always build zImage for ARM
- rpm/kernel-binary.spec.in: Do not explicitly set DEBUG_SECTION_MISMATCH CONFIG_DEBUG_SECTION_MISMATCH is a selectable Kconfig option since 2.6.39 and is enabled in our configs.
- rpm/kernel-binary.spec.in: Drop the %build_src_dir macro It is the parent directory of the O= directory.
- rpm/kernel-binary.spec.in: really pass down %{?_smp_mflags}
- rpm/kernel-binary.spec.in: Use parallel make in all invocations Also, remove the lengthy comment, since we are using a standard rpm macro now.
- rpm/kernel-binary.spec.in: Use upstream script to support config.addon
- s390/dasd: fix disconnected device with valid path mask (bnc#954986, LTC#132707).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#954986, LTC#132706).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954986, LTC#133077).
- sched: Call select_idle_sibling() when not affine_sd (Scheduler Performance).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#957395).
- sched/numa: Check all nodes when placing a pseudo-interleaved group (Automatic NUMA Balancing (fate#315482)).
- sched/numa: Fix math underflow in task_tick_numa() (Automatic NUMA Balancing (fate#315482)).
- sched/numa: Only consider less busy nodes as numa balancing destinations (Automatic NUMA Balancing (fate#315482)).
- sched: Put expensive runtime debugging checks under a separate Kconfig entry (Scheduler performance).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- sunrpc/cache: make cache flushing more reliable (bsc#947478).
- sunrpc: Fix oops when trace sunrpc_task events in nfs client (bnc#956703).
- supported.conf: Support peak_pci and sja1000: These 2 CAN drivers are
supported in the RT kernel for a long time so we can also support them
- target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666).
- target: Send UA upon LUN RESET tmr completion (bsc#933514).
- target: use 'se_dev_entry' when allocating UAs (bsc#933514).
- Update config files. (bnc#955644)
- Update kabi files with sbc_parse_cdb symbol change (bsc#954635).
- usbvision fix overflow of interfaces array (bnc#950998).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- x86/efi: Fix invalid parameter error when getting hibernation key (fate#316350, bsc#956284).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86/mm: Add parenthesis for TLB tracepoint size calculation (VM Performance (Reduce IPIs during reclaim)).
- x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148).
- x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148).
- x86/tsc: Let high latency PIT fail fast in quick_pit_calibrate() (bsc#953717).
- xen: fix boot crash in EC2 settings (bsc#956147).
- xen: refresh patches.xen/xen-x86_64-m2p-strict (bsc#956147).
- xen: Update Xen patches to 3.12.50.
- xfs: always drain dio before extending aio write submission (bsc#949744).
- xfs: DIO needs an ioend for writes (bsc#949744).
- xfs: DIO write completion size updates race (bsc#949744).
- xfs: DIO writes within EOF do not need an ioend (bsc#949744).
- xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744).
- xfs: do not allocate an ioend for direct I/O completions (bsc#949744).
- xfs: factor DIO write mapping from get_blocks (bsc#949744).
- xfs: handle DIO overwrite EOF update completion correctly (bsc#949744).
- xfs: move DIO mapping size calculation (bsc#949744).
- xfs: using generic_file_direct_write() is unnecessary (bsc#949744).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165).
- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#957546).
- zfcp: fix fc_host port_type with NPIV (bnc#954986, LTC#132479).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2015-985,SUSE-SLE-Live-Patching-12-2015-985,SUSE-SLE-Module-Public-Cloud-12-2015-985,SUSE-SLE-SDK-12-SP1-2015-985,SUSE-SLE-SERVER-12-SP1-2015-985,SUSE-SLE-WE-12-SP1-2015-985
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.51 to receive\nvarious security and bugfixes.\n\nFollowing features were added:\n- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).\n\nFollowing security bugs were fixed:\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux\n kernel did not validate attempted changes to the MTU value, which allowed\n context-dependent attackers to cause a denial of service (packet loss)\n via a value that is (1) smaller than the minimum compliant value or\n (2) larger than the MTU of an interface, as demonstrated by a Router\n Advertisement (RA) message that is not validated by a daemon, a different\n vulnerability than CVE-2015-0272. (bsc#955354)\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c in\n the Linux kernel attempted to support a FRAGLIST feature without proper\n memory allocation, which allowed guest OS users to cause a denial of\n service (buffer overflow and memory corruption) via a crafted sequence\n of fragmented packets (bnc#940776).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c\n in the Linux kernel allowed local users to cause a denial of service\n (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in\n the Linux kernel did not ensure that certain slot numbers are valid,\n which allowed local users to cause a denial of service (NULL\n pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl\n call (bnc#949936).\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#926238).\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#952384).\n\nThe following non-security bugs were fixed:\n- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#954986, LTC#131684).\n- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).\n- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).\n- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).\n- audit: correctly record file names with different path name types (bsc#950013).\n- audit: create private file name copies when auditing inodes (bsc#950013).\n- bcache: Add btree_insert_node() (bnc#951638).\n- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).\n- bcache: backing device set to clean after finishing detach (bsc#951638).\n- bcache: backing device set to clean after finishing detach (bsc#951638).\n- bcache: Clean up keylist code (bnc#951638).\n- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).\n- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).\n- bcache: Explicitly track btree node\u0027s parent (bnc#951638).\n- bcache: Fix a bug when detaching (bsc#951638).\n- bcache: Fix a lockdep splat in an error path (bnc#951638).\n- bcache: Fix a shutdown bug (bsc#951638).\n- bcache: Fix more early shutdown bugs (bsc#951638).\n- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- bcache: Insert multiple keys at a time (bnc#951638).\n- bcache: kill closure locking usage (bnc#951638).\n- bcache: Refactor journalling flow control (bnc#951638).\n- bcache: Refactor request_write() (bnc#951638).\n- bcache: Use blkdev_issue_discard() (bnc#951638).\n- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).\n- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).\n- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).\n- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).\n- btrfs: fix condition of commit transaction (bsc#958647).\n- btrfs: fix condition of commit transaction (bsc#958647).\n- btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053).\n- btrfs: Fix out-of-space bug (bsc#958647).\n- btrfs: Fix out-of-space bug (bsc#958647).\n- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).\n- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).\n- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).\n- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).\n- btrfs: fix truncation of compressed and inlined extents (bnc#956053).\n- btrfs: Set relative data on clear btrfs_block_group_cache-\u0026gt;pinned (bsc#958647).\n- btrfs: Set relative data on clear btrfs_block_group_cache-\u003epinned (bsc#958647).\n- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).\n- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).\n- cache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773).\n- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#957395).\n- cxgb4i: Increased the value of MAX_IMM_TX_PKT_LEN from 128 to 256 bytes (bsc#950580).\n- dlm: make posix locks interruptible, (bsc#947241).\n- dmapi: Fix xfs dmapi to not unlock \u0026 lock XFS_ILOCK_EXCL (bsc#949744).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- dm-snap: avoid deadock on s-\u0026gt;lock when a read is split (bsc#939826).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- drm: Allocate new master object when client becomes master (bsc#956876, bsc#956801).\n- drm: Fix KABI of \u0027struct drm_file\u0027 (bsc#956876, bsc#956801).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- drm/i915: clean up backlight conditional build (bsc#941113).\n- drm/i915: debug print on backlight register (bsc#941113).\n- drm/i915: do full backlight setup at enable time (bsc#941113).\n- drm/i915: do not save/restore backlight registers in KMS (bsc#941113).\n- drm/i915: Eliminate lots of WARNs when there\u0027s no backlight present (bsc#941113).\n- drm/i915: fix gen2-gen3 backlight set (bsc#941113,bsc#953971).\n- drm/i915: Fix gen3 self-refresh watermarks (bsc#953830,bsc#953971).\n- drm/i915: Fix missing backlight update during panel disablement (bsc#941113).\n- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).\n- drm/i915: gather backlight information at setup (bsc#941113).\n- drm/i915: handle backlight through chip specific functions (bsc#941113).\n- drm/i915: Ignore \u0027digital output\u0027 and \u0027not HDMI output\u0027 bits for eDP detection (bsc#949192).\n- drm/i915: make asle notifications update backlight on all connectors (bsc#941113).\n- drm/i915: make backlight info per-connector (bsc#941113).\n- drm/i915: move backlight level setting in enable/disable to hooks (bsc#941113).\n- drm/i915: move opregion asle request handling to a work queue (bsc#953826).\n- drm/i915: nuke get max backlight functions (bsc#941113).\n- drm/i915/opregion: fix build error on CONFIG_ACPI=n (bsc#953826).\n- drm/i915: restore backlight precision when converting from ACPI (bsc#941113).\n- drm/i915/tv: add -\u0026gt;get_config callback (bsc#953830).\n- drm/i915: use backlight legacy combination mode also for i915gm/i945gm (bsc#941113).\n- drm/i915: use the initialized backlight max value instead of reading it (bsc#941113).\n- drm/i915: vlv does not have pipe field in backlight registers (bsc#941113).\n- fanotify: fix notification of groups with inode \u0026 mount marks (bsc#955533).\n- Fix remove_and_add_spares removes drive added as spare in slot_store (bsc#956717).\n- genksyms: Handle string literals with spaces in reference files (bsc#958510).\n- genksyms: Handle string literals with spaces in reference files (bsc#958510).\n- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).\n in the non-RT kernel to minimize the differences.\n- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).\n- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).\n- ixgbe: fix broken PFC with X550 (bsc#951864).\n- ixgbe: use correct fcoe ddp max check (bsc#951864).\n- kabi: Fix spurious kabi change in mm/util.c.\n- kABI: protect struct ahci_host_priv.\n- kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635).\n- kabi: Restore kabi in struct se_cmd (bsc#954635).\n- kabi: Restore kabi in struct se_subsystem_api (bsc#954635).\n- ktime: add ktime_after and ktime_before helper (bsc#904348).\n- mm: factor commit limit calculation (VM Performance).\n- mm: get rid of \u0027vmalloc_info\u0027 from /proc/meminfo (VM Performance).\n- mm: hugetlbfs: skip shared VMAs when unmapping private pages to satisfy a fault (Automatic NUMA Balancing (fate#315482)).\n- mm: remove PG_waiters from PAGE_FLAGS_CHECK_AT_FREE (bnc#943959).\n- mm: vmscan: never isolate more pages than necessary (VM Performance).\n- Move ktime_after patch to the networking section\n- nfsrdma: Fix regression in NFSRDMA server (bsc#951110).\n- pci: Drop \u0027setting latency timer\u0027 messages (bsc#956047).\n- pci: Update VPD size with correct length (bsc#924493).\n- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).\n- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).\n- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).\n- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).\n- pm, hinernate: use put_page in release_swap_writer (bnc#943959).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- Re-add copy_page_vector_to_user()\n- ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711).\n- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).\n- rpm/constraints.in: Require 14GB worth of disk space on POWER The builds started to fail randomly due to ENOSPC errors.\n- rpm/kernel-binary.spec.in: Always build zImage for ARM\n- rpm/kernel-binary.spec.in: Do not explicitly set DEBUG_SECTION_MISMATCH CONFIG_DEBUG_SECTION_MISMATCH is a selectable Kconfig option since 2.6.39 and is enabled in our configs.\n- rpm/kernel-binary.spec.in: Drop the %build_src_dir macro It is the parent directory of the O= directory.\n- rpm/kernel-binary.spec.in: really pass down %{?_smp_mflags}\n- rpm/kernel-binary.spec.in: Use parallel make in all invocations Also, remove the lengthy comment, since we are using a standard rpm macro now.\n- rpm/kernel-binary.spec.in: Use upstream script to support config.addon\n- s390/dasd: fix disconnected device with valid path mask (bnc#954986, LTC#132707).\n- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#954986, LTC#132706).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954986, LTC#133077).\n- sched: Call select_idle_sibling() when not affine_sd (Scheduler Performance).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#957395).\n- sched/numa: Check all nodes when placing a pseudo-interleaved group (Automatic NUMA Balancing (fate#315482)).\n- sched/numa: Fix math underflow in task_tick_numa() (Automatic NUMA Balancing (fate#315482)).\n- sched/numa: Only consider less busy nodes as numa balancing destinations (Automatic NUMA Balancing (fate#315482)).\n- sched: Put expensive runtime debugging checks under a separate Kconfig entry (Scheduler performance).\n- scsi: hosts: update to use ida_simple for host_no (bsc#939926)\n- sunrpc/cache: make cache flushing more reliable (bsc#947478).\n- sunrpc: Fix oops when trace sunrpc_task events in nfs client (bnc#956703).\n- supported.conf: Support peak_pci and sja1000: These 2 CAN drivers are\n supported in the RT kernel for a long time so we can also support them\n- target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666).\n- target: Send UA upon LUN RESET tmr completion (bsc#933514).\n- target: use \u0027se_dev_entry\u0027 when allocating UAs (bsc#933514).\n- Update config files. (bnc#955644)\n- Update kabi files with sbc_parse_cdb symbol change (bsc#954635).\n- usbvision fix overflow of interfaces array (bnc#950998).\n- vmxnet3: adjust ring sizes when interface is down (bsc#950750).\n- vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).\n- x86/efi: Fix invalid parameter error when getting hibernation key (fate#316350, bsc#956284).\n- x86/evtchn: make use of PHYSDEVOP_map_pirq.\n- x86/mm: Add parenthesis for TLB tracepoint size calculation (VM Performance (Reduce IPIs during reclaim)).\n- x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148).\n- x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148).\n- x86/tsc: Let high latency PIT fail fast in quick_pit_calibrate() (bsc#953717).\n- xen: fix boot crash in EC2 settings (bsc#956147).\n- xen: refresh patches.xen/xen-x86_64-m2p-strict (bsc#956147).\n- xen: Update Xen patches to 3.12.50.\n- xfs: always drain dio before extending aio write submission (bsc#949744).\n- xfs: DIO needs an ioend for writes (bsc#949744).\n- xfs: DIO write completion size updates race (bsc#949744).\n- xfs: DIO writes within EOF do not need an ioend (bsc#949744).\n- xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744).\n- xfs: do not allocate an ioend for direct I/O completions (bsc#949744).\n- xfs: factor DIO write mapping from get_blocks (bsc#949744).\n- xfs: handle DIO overwrite EOF update completion correctly (bsc#949744).\n- xfs: move DIO mapping size calculation (bsc#949744).\n- xfs: using generic_file_direct_write() is unnecessary (bsc#949744).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165).\n- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#957546).\n- zfcp: fix fc_host port_type with NPIV (bnc#954986, LTC#132479).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2015-985,SUSE-SLE-Live-Patching-12-2015-985,SUSE-SLE-Module-Public-Cloud-12-2015-985,SUSE-SLE-SDK-12-SP1-2015-985,SUSE-SLE-SERVER-12-SP1-2015-985,SUSE-SLE-WE-12-SP1-2015-985", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2292-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2292-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152292-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2292-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html" }, { "category": "self", "summary": "SUSE Bug 758040", "url": "https://bugzilla.suse.com/758040" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 921949", "url": "https://bugzilla.suse.com/921949" }, { "category": "self", "summary": "SUSE Bug 924493", "url": "https://bugzilla.suse.com/924493" }, { "category": "self", "summary": "SUSE Bug 926238", "url": "https://bugzilla.suse.com/926238" }, { "category": "self", "summary": "SUSE Bug 933514", "url": "https://bugzilla.suse.com/933514" }, { "category": "self", "summary": "SUSE Bug 936773", "url": "https://bugzilla.suse.com/936773" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 940776", "url": "https://bugzilla.suse.com/940776" }, { "category": "self", "summary": "SUSE Bug 941113", "url": "https://bugzilla.suse.com/941113" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 943959", "url": "https://bugzilla.suse.com/943959" }, { "category": "self", "summary": "SUSE Bug 944296", "url": "https://bugzilla.suse.com/944296" }, { "category": "self", "summary": "SUSE Bug 947241", "url": "https://bugzilla.suse.com/947241" }, { "category": "self", "summary": "SUSE Bug 947478", "url": "https://bugzilla.suse.com/947478" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949192", "url": "https://bugzilla.suse.com/949192" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949936", "url": "https://bugzilla.suse.com/949936" }, { "category": "self", "summary": "SUSE Bug 950013", "url": "https://bugzilla.suse.com/950013" }, { "category": "self", "summary": "SUSE Bug 950580", "url": "https://bugzilla.suse.com/950580" }, { "category": "self", "summary": "SUSE Bug 950750", "url": "https://bugzilla.suse.com/950750" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951110", "url": "https://bugzilla.suse.com/951110" }, { "category": "self", "summary": "SUSE Bug 951165", "url": "https://bugzilla.suse.com/951165" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 951638", "url": "https://bugzilla.suse.com/951638" }, { "category": "self", "summary": "SUSE Bug 951864", "url": "https://bugzilla.suse.com/951864" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952666", "url": "https://bugzilla.suse.com/952666" }, { "category": "self", "summary": "SUSE Bug 953717", "url": "https://bugzilla.suse.com/953717" }, { "category": "self", "summary": "SUSE Bug 953826", "url": "https://bugzilla.suse.com/953826" }, { "category": "self", "summary": "SUSE Bug 953830", "url": "https://bugzilla.suse.com/953830" }, { "category": "self", "summary": "SUSE Bug 953971", "url": "https://bugzilla.suse.com/953971" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954635", "url": "https://bugzilla.suse.com/954635" }, { "category": "self", "summary": "SUSE Bug 954986", "url": "https://bugzilla.suse.com/954986" }, { "category": "self", "summary": "SUSE Bug 955136", "url": "https://bugzilla.suse.com/955136" }, { "category": "self", "summary": "SUSE Bug 955148", "url": "https://bugzilla.suse.com/955148" }, { "category": "self", "summary": "SUSE Bug 955224", "url": "https://bugzilla.suse.com/955224" }, { "category": "self", "summary": "SUSE Bug 955354", "url": "https://bugzilla.suse.com/955354" }, { "category": "self", "summary": "SUSE Bug 955422", "url": "https://bugzilla.suse.com/955422" }, { "category": "self", "summary": "SUSE Bug 955533", "url": "https://bugzilla.suse.com/955533" }, { "category": "self", "summary": "SUSE Bug 955644", "url": "https://bugzilla.suse.com/955644" }, { "category": "self", "summary": "SUSE Bug 956047", "url": "https://bugzilla.suse.com/956047" }, { "category": "self", "summary": "SUSE Bug 956053", "url": "https://bugzilla.suse.com/956053" }, { "category": "self", "summary": "SUSE Bug 956147", "url": "https://bugzilla.suse.com/956147" }, { "category": "self", "summary": "SUSE Bug 956284", "url": "https://bugzilla.suse.com/956284" }, { "category": "self", "summary": "SUSE Bug 956703", "url": "https://bugzilla.suse.com/956703" }, { "category": "self", "summary": "SUSE Bug 956711", "url": "https://bugzilla.suse.com/956711" }, { "category": "self", "summary": "SUSE Bug 956717", "url": "https://bugzilla.suse.com/956717" }, { "category": "self", "summary": "SUSE Bug 956801", "url": "https://bugzilla.suse.com/956801" }, { "category": "self", "summary": "SUSE Bug 956876", "url": "https://bugzilla.suse.com/956876" }, { "category": "self", "summary": "SUSE Bug 957395", "url": "https://bugzilla.suse.com/957395" }, { "category": "self", "summary": "SUSE Bug 957546", "url": "https://bugzilla.suse.com/957546" }, { "category": "self", "summary": "SUSE Bug 958504", "url": "https://bugzilla.suse.com/958504" }, { "category": "self", "summary": "SUSE Bug 958510", "url": "https://bugzilla.suse.com/958510" }, { "category": "self", "summary": "SUSE Bug 958647", "url": "https://bugzilla.suse.com/958647" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5156 page", "url": "https://www.suse.com/security/cve/CVE-2015-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-12-17T12:08:13Z", "generator": { "date": "2015-12-17T12:08:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2292-1", "initial_release_date": "2015-12-17T12:08:13Z", "revision_history": [ { "date": "2015-12-17T12:08:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.51-60.20.2.noarch", "product": { "name": "kernel-devel-3.12.51-60.20.2.noarch", "product_id": "kernel-devel-3.12.51-60.20.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.51-60.20.2.noarch", "product": { "name": "kernel-macros-3.12.51-60.20.2.noarch", "product_id": "kernel-macros-3.12.51-60.20.2.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.51-60.20.2.noarch", "product": { "name": "kernel-source-3.12.51-60.20.2.noarch", "product_id": "kernel-source-3.12.51-60.20.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.51-60.20.2.noarch", "product": { "name": "kernel-docs-3.12.51-60.20.2.noarch", "product_id": "kernel-docs-3.12.51-60.20.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.51-60.20.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.51-60.20.1.ppc64le", "product_id": "kernel-obs-build-3.12.51-60.20.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.51-60.20.2.ppc64le", "product": { "name": "kernel-default-3.12.51-60.20.2.ppc64le", "product_id": "kernel-default-3.12.51-60.20.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.51-60.20.2.ppc64le", "product": { "name": "kernel-default-base-3.12.51-60.20.2.ppc64le", "product_id": "kernel-default-base-3.12.51-60.20.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le", "product": { "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le", "product_id": "kernel-default-devel-3.12.51-60.20.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.51-60.20.2.ppc64le", "product": { "name": "kernel-syms-3.12.51-60.20.2.ppc64le", "product_id": "kernel-syms-3.12.51-60.20.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.51-60.20.1.s390x", "product": { "name": "kernel-obs-build-3.12.51-60.20.1.s390x", "product_id": "kernel-obs-build-3.12.51-60.20.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.51-60.20.2.s390x", "product": { "name": "kernel-default-3.12.51-60.20.2.s390x", "product_id": "kernel-default-3.12.51-60.20.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.51-60.20.2.s390x", "product": { "name": "kernel-default-base-3.12.51-60.20.2.s390x", "product_id": "kernel-default-base-3.12.51-60.20.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.51-60.20.2.s390x", "product": { "name": "kernel-default-devel-3.12.51-60.20.2.s390x", "product_id": "kernel-default-devel-3.12.51-60.20.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.51-60.20.2.s390x", "product": { "name": "kernel-default-man-3.12.51-60.20.2.s390x", "product_id": "kernel-default-man-3.12.51-60.20.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.51-60.20.2.s390x", "product": { "name": "kernel-syms-3.12.51-60.20.2.s390x", "product_id": "kernel-syms-3.12.51-60.20.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-default-3.12.51-60.20.2.x86_64", "product_id": "kernel-default-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-default-devel-3.12.51-60.20.2.x86_64", "product_id": "kernel-default-devel-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-default-extra-3.12.51-60.20.2.x86_64", "product_id": "kernel-default-extra-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-syms-3.12.51-60.20.2.x86_64", "product_id": "kernel-syms-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-xen-3.12.51-60.20.2.x86_64", "product_id": "kernel-xen-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "product_id": "kernel-xen-devel-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-ec2-3.12.51-60.20.2.x86_64", "product_id": "kernel-ec2-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-ec2-devel-3.12.51-60.20.2.x86_64", "product_id": "kernel-ec2-devel-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-ec2-extra-3.12.51-60.20.2.x86_64", "product_id": "kernel-ec2-extra-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.51-60.20.1.x86_64", "product": { "name": "kernel-obs-build-3.12.51-60.20.1.x86_64", "product_id": "kernel-obs-build-3.12.51-60.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-default-base-3.12.51-60.20.2.x86_64", "product_id": "kernel-default-base-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-xen-base-3.12.51-60.20.2.x86_64", "product_id": "kernel-xen-base-3.12.51-60.20.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-devel-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-macros-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-source-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-syms-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-ec2-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-docs-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.51-60.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.51-60.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.51-60.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x" }, "product_reference": "kernel-obs-build-3.12.51-60.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.51-60.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.51-60.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-man-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-devel-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-macros-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-source-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-syms-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-syms-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-syms-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-man-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-devel-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-macros-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-source-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-syms-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-syms-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-syms-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5156" } ], "notes": [ { "category": "general", "text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5156", "url": "https://www.suse.com/security/cve/CVE-2015-5156" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1123903" }, { "category": "external", "summary": "SUSE Bug 940776 for CVE-2015-5156", "url": "https://bugzilla.suse.com/940776" }, { "category": "external", "summary": "SUSE Bug 945048 for CVE-2015-5156", "url": "https://bugzilla.suse.com/945048" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-5156", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "moderate" } ], "title": "CVE-2015-5156" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "low" } ], "title": "CVE-2015-8215" } ] }
suse-su-2016:0380-1
Vulnerability from csaf_suse
Published
2016-02-08 13:45
Modified
2016-02-08 13:45
Summary
Security update for kernel live patch 3
Notes
Title of the patch
Security update for kernel live patch 3
Description of the patch
This kernel live patch for Linux Kernel 3.12.38-44.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-221
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 3", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.38-44.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-221", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0380-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0380-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160380-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0380-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001856.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 3", "tracking": { "current_release_date": "2016-02-08T13:45:58Z", "generator": { "date": "2016-02-08T13:45:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0380-1", "initial_release_date": "2016-02-08T13:45:58Z", "revision_history": [ { "date": "2016-02-08T13:45:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_38-44-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:58Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2015:2194-1
Vulnerability from csaf_suse
Published
2015-12-04 09:34
Modified
2015-12-04 09:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to 3.12.51 to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers were valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-5283: The sctp_init function in net/sctp/protocol.c in the Linux kernel had an incorrect sequence of protocol-initialization steps, which allowed local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished (bnc#947155).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux kernel did not properly handle rename actions inside a bind mount, which allowed local users to bypass an intended container protection mechanism by renaming a directory, related to a 'double-chroot attack (bnc#926238).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).
The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- Add PCI IDs of Intel Sunrise Point-H SATA Controller S232/236 (bsc#953796).
- Btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053).
- Btrfs: fix truncation of compressed and inlined extents (bnc#956053).
- Disable some ppc64le netfilter modules to restore the kabi (bsc#951546)
- Fix regression in NFSRDMA server (bsc#951110).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- KVM: x86: call irq notifiers with directed EOI (bsc#950862).
- NVMe: Add shutdown timeout as module parameter (bnc#936076).
- NVMe: Mismatched host/device page size support (bsc#935961).
- PCI: Drop 'setting latency timer' messages (bsc#956047).
- SCSI: Fix hard lockup in scsi_remove_target() (bsc#944749).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SUNRPC: Fix oops when trace sunrpc_task events in nfs client (bnc#956703).
- Sync ppc64le netfilter config options with other archs (bnc#951546)
- Update kabi files with sbc_parse_cdb symbol change (bsc#954635).
- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).
- apparmor: temporary work around for bug while unloading policy (boo#941867).
- audit: correctly record file names with different path name types (bsc#950013).
- audit: create private file name copies when auditing inodes (bsc#950013).
- cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773).
- dlm: make posix locks interruptible, (bsc#947241).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dmapi: Fix xfs dmapi to not unlock and lock XFS_ILOCK_EXCL (bsc#949744).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- fanotify: fix notification of groups with inode and mount marks (bsc#955533).
- genirq: Make sure irq descriptors really exist when __irq_alloc_descs returns (bsc#945626).
- hv: vss: run only on supported host versions (bnc#949504).
- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).
- ipv6: Check RTF_LOCAL on rt->rt6i_flags instead of rt->dst.flags (bsc#947321).
- ipv6: Consider RTF_CACHE when searching the fib6 tree (bsc#947321).
- ipv6: Extend the route lookups to low priority metrics (bsc#947321).
- ipv6: Stop /128 route from disappearing after pmtu update (bsc#947321).
- ipv6: Stop rt6_info from using inet_peer's metrics (bsc#947321).
- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).
- ipvs: drop first packet to dead server (bsc#946078).
- kABI: protect struct ahci_host_priv.
- kABI: protect struct rt6_info changes from bsc#947321 changes (bsc#947321).
- kabi: Hide rt6_* types from genksyms on ppc64le (bsc#951546).
- kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635).
- kabi: Restore kabi in struct se_cmd (bsc#954635).
- kabi: Restore kabi in struct se_subsystem_api (bsc#954635).
- kabi: protect skb_copy_and_csum_datagram_iovec() signature (bsc#951199).
- kgr: fix migration of kthreads to the new universe.
- kgr: wake up kthreads periodically.
- ktime: add ktime_after and ktime_before helper (bsc#904348).
- macvlan: Support bonding events (bsc#948521).
- net: add length argument to skb_copy_and_csum_datagram_iovec (bsc#951199).
- net: handle null iovec pointer in skb_copy_and_csum_datagram_iovec() (bsc#951199).
- pci: Update VPD size with correct length (bsc#924493).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711).
- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtc: cmos: Revert 'rtc-cmos: Add an alarm disable quirk' (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sunrpc/cache: make cache flushing more reliable (bsc#947478).
- supported.conf: Add missing dependencies of supported modules hwmon_vid needed by nct6775 hwmon_vid needed by w83627ehf reed_solomon needed by ramoops
- supported.conf: Fix dependencies on ppc64le of_mdio needed by mdio-gpio
- target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666).
- target/rbd: fix COMPARE AND WRITE page vector leak (bnc#948831).
- target/rbd: fix PR info memory leaks (bnc#948831).
- target: Send UA upon LUN RESET tmr completion (bsc#933514).
- target: use '^A' when allocating UAs (bsc#933514).
- usbvision fix overflow of interfaces array (bnc#950998).
- vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime, instead of top-down (bsc#940853).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148).
- x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148).
- xfs: DIO needs an ioend for writes (bsc#949744).
- xfs: DIO write completion size updates race (bsc#949744).
- xfs: DIO writes within EOF do not need an ioend (bsc#949744).
- xfs: always drain dio before extending aio write submission (bsc#949744).
- xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744).
- xfs: do not allocate an ioend for direct I/O completions (bsc#949744).
- xfs: factor DIO write mapping from get_blocks (bsc#949744).
- xfs: handle DIO overwrite EOF update completion correctly (bsc#949744).
- xfs: move DIO mapping size calculation (bsc#949744).
- xfs: using generic_file_direct_write() is unnecessary (bsc#949744).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949463).
Patchnames
SUSE-SLE-DESKTOP-12-2015-945,SUSE-SLE-Live-Patching-12-2015-945,SUSE-SLE-Module-Public-Cloud-12-2015-945,SUSE-SLE-SDK-12-2015-945,SUSE-SLE-SERVER-12-2015-945,SUSE-SLE-WE-12-2015-945
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 kernel was updated to 3.12.51 to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers were valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).\n- CVE-2015-5283: The sctp_init function in net/sctp/protocol.c in the Linux kernel had an incorrect sequence of protocol-initialization steps, which allowed local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished (bnc#947155).\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux kernel did not properly handle rename actions inside a bind mount, which allowed local users to bypass an intended container protection mechanism by renaming a directory, related to a \u0027double-chroot attack (bnc#926238).\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).\n- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).\n\nThe following non-security bugs were fixed:\n- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- Add PCI IDs of Intel Sunrise Point-H SATA Controller S232/236 (bsc#953796).\n- Btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053).\n- Btrfs: fix truncation of compressed and inlined extents (bnc#956053).\n- Disable some ppc64le netfilter modules to restore the kabi (bsc#951546)\n- Fix regression in NFSRDMA server (bsc#951110).\n- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).\n- KVM: x86: call irq notifiers with directed EOI (bsc#950862).\n- NVMe: Add shutdown timeout as module parameter (bnc#936076).\n- NVMe: Mismatched host/device page size support (bsc#935961).\n- PCI: Drop \u0027setting latency timer\u0027 messages (bsc#956047).\n- SCSI: Fix hard lockup in scsi_remove_target() (bsc#944749).\n- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)\n- SUNRPC: Fix oops when trace sunrpc_task events in nfs client (bnc#956703).\n- Sync ppc64le netfilter config options with other archs (bnc#951546)\n- Update kabi files with sbc_parse_cdb symbol change (bsc#954635).\n- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).\n- apparmor: temporary work around for bug while unloading policy (boo#941867).\n- audit: correctly record file names with different path name types (bsc#950013).\n- audit: create private file name copies when auditing inodes (bsc#950013).\n- cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773).\n- dlm: make posix locks interruptible, (bsc#947241).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- dm-snap: avoid deadock on s-\u003elock when a read is split (bsc#939826).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- dmapi: Fix xfs dmapi to not unlock and lock XFS_ILOCK_EXCL (bsc#949744).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- fanotify: fix notification of groups with inode and mount marks (bsc#955533).\n- genirq: Make sure irq descriptors really exist when __irq_alloc_descs returns (bsc#945626).\n- hv: vss: run only on supported host versions (bnc#949504).\n- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).\n- ipv6: Check RTF_LOCAL on rt-\u003ert6i_flags instead of rt-\u003edst.flags (bsc#947321).\n- ipv6: Consider RTF_CACHE when searching the fib6 tree (bsc#947321).\n- ipv6: Extend the route lookups to low priority metrics (bsc#947321).\n- ipv6: Stop /128 route from disappearing after pmtu update (bsc#947321).\n- ipv6: Stop rt6_info from using inet_peer\u0027s metrics (bsc#947321).\n- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).\n- ipvs: drop first packet to dead server (bsc#946078).\n- kABI: protect struct ahci_host_priv.\n- kABI: protect struct rt6_info changes from bsc#947321 changes (bsc#947321).\n- kabi: Hide rt6_* types from genksyms on ppc64le (bsc#951546).\n- kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635).\n- kabi: Restore kabi in struct se_cmd (bsc#954635).\n- kabi: Restore kabi in struct se_subsystem_api (bsc#954635).\n- kabi: protect skb_copy_and_csum_datagram_iovec() signature (bsc#951199).\n- kgr: fix migration of kthreads to the new universe.\n- kgr: wake up kthreads periodically.\n- ktime: add ktime_after and ktime_before helper (bsc#904348).\n- macvlan: Support bonding events (bsc#948521).\n- net: add length argument to skb_copy_and_csum_datagram_iovec (bsc#951199).\n- net: handle null iovec pointer in skb_copy_and_csum_datagram_iovec() (bsc#951199).\n- pci: Update VPD size with correct length (bsc#924493).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711).\n- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).\n- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).\n- rtc: cmos: Revert \u0027rtc-cmos: Add an alarm disable quirk\u0027 (bsc#930145).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- sunrpc/cache: make cache flushing more reliable (bsc#947478).\n- supported.conf: Add missing dependencies of supported modules hwmon_vid needed by nct6775 hwmon_vid needed by w83627ehf reed_solomon needed by ramoops\n- supported.conf: Fix dependencies on ppc64le of_mdio needed by mdio-gpio\n- target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666).\n- target/rbd: fix COMPARE AND WRITE page vector leak (bnc#948831).\n- target/rbd: fix PR info memory leaks (bnc#948831).\n- target: Send UA upon LUN RESET tmr completion (bsc#933514).\n- target: use \u0027^A\u0027 when allocating UAs (bsc#933514).\n- usbvision fix overflow of interfaces array (bnc#950998).\n- vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).\n- vmxnet3: adjust ring sizes when interface is down (bsc#950750).\n- x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime, instead of top-down (bsc#940853).\n- x86/evtchn: make use of PHYSDEVOP_map_pirq.\n- x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148).\n- x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148).\n- xfs: DIO needs an ioend for writes (bsc#949744).\n- xfs: DIO write completion size updates race (bsc#949744).\n- xfs: DIO writes within EOF do not need an ioend (bsc#949744).\n- xfs: always drain dio before extending aio write submission (bsc#949744).\n- xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744).\n- xfs: do not allocate an ioend for direct I/O completions (bsc#949744).\n- xfs: factor DIO write mapping from get_blocks (bsc#949744).\n- xfs: handle DIO overwrite EOF update completion correctly (bsc#949744).\n- xfs: move DIO mapping size calculation (bsc#949744).\n- xfs: using generic_file_direct_write() is unnecessary (bsc#949744).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165).\n- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949463).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-945,SUSE-SLE-Live-Patching-12-2015-945,SUSE-SLE-Module-Public-Cloud-12-2015-945,SUSE-SLE-SDK-12-2015-945,SUSE-SLE-SERVER-12-2015-945,SUSE-SLE-WE-12-2015-945", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2194-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2194-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152194-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2194-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 867595", "url": "https://bugzilla.suse.com/867595" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 921949", "url": "https://bugzilla.suse.com/921949" }, { "category": "self", "summary": "SUSE Bug 924493", "url": "https://bugzilla.suse.com/924493" }, { "category": "self", "summary": "SUSE Bug 930145", "url": "https://bugzilla.suse.com/930145" }, { "category": "self", "summary": "SUSE Bug 933514", "url": "https://bugzilla.suse.com/933514" }, { "category": "self", "summary": "SUSE Bug 935961", "url": "https://bugzilla.suse.com/935961" }, { "category": "self", "summary": "SUSE Bug 936076", "url": "https://bugzilla.suse.com/936076" }, { "category": "self", "summary": "SUSE Bug 936773", "url": "https://bugzilla.suse.com/936773" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 940853", "url": "https://bugzilla.suse.com/940853" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 941867", "url": "https://bugzilla.suse.com/941867" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 944749", "url": "https://bugzilla.suse.com/944749" }, { "category": "self", "summary": "SUSE Bug 945626", "url": "https://bugzilla.suse.com/945626" }, { "category": "self", "summary": "SUSE Bug 946078", "url": "https://bugzilla.suse.com/946078" }, { "category": "self", "summary": "SUSE Bug 947241", "url": "https://bugzilla.suse.com/947241" }, { "category": "self", "summary": "SUSE Bug 947321", "url": "https://bugzilla.suse.com/947321" }, { "category": "self", "summary": "SUSE Bug 947478", "url": "https://bugzilla.suse.com/947478" }, { "category": "self", "summary": "SUSE Bug 948521", "url": "https://bugzilla.suse.com/948521" }, { "category": "self", "summary": "SUSE Bug 948685", "url": "https://bugzilla.suse.com/948685" }, { "category": "self", "summary": "SUSE Bug 948831", "url": "https://bugzilla.suse.com/948831" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949463", "url": "https://bugzilla.suse.com/949463" }, { "category": "self", "summary": "SUSE Bug 949504", "url": "https://bugzilla.suse.com/949504" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 950013", "url": "https://bugzilla.suse.com/950013" }, { "category": "self", "summary": "SUSE Bug 950750", "url": "https://bugzilla.suse.com/950750" }, { "category": "self", "summary": "SUSE Bug 950862", "url": "https://bugzilla.suse.com/950862" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951110", "url": "https://bugzilla.suse.com/951110" }, { "category": "self", "summary": "SUSE Bug 951165", "url": "https://bugzilla.suse.com/951165" }, { "category": "self", "summary": "SUSE Bug 951199", "url": "https://bugzilla.suse.com/951199" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 951546", "url": "https://bugzilla.suse.com/951546" }, { "category": "self", "summary": "SUSE Bug 952666", "url": "https://bugzilla.suse.com/952666" }, { "category": "self", "summary": "SUSE Bug 952758", "url": "https://bugzilla.suse.com/952758" }, { "category": "self", "summary": "SUSE Bug 953796", "url": "https://bugzilla.suse.com/953796" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954635", "url": "https://bugzilla.suse.com/954635" }, { "category": "self", "summary": "SUSE Bug 955148", "url": "https://bugzilla.suse.com/955148" }, { "category": "self", "summary": "SUSE Bug 955224", "url": "https://bugzilla.suse.com/955224" }, { "category": "self", "summary": "SUSE Bug 955422", "url": "https://bugzilla.suse.com/955422" }, { "category": "self", "summary": "SUSE Bug 955533", "url": "https://bugzilla.suse.com/955533" }, { "category": "self", "summary": "SUSE Bug 955644", "url": "https://bugzilla.suse.com/955644" }, { "category": "self", "summary": "SUSE Bug 956047", "url": "https://bugzilla.suse.com/956047" }, { "category": "self", "summary": "SUSE Bug 956053", "url": "https://bugzilla.suse.com/956053" }, { "category": "self", "summary": "SUSE Bug 956703", "url": "https://bugzilla.suse.com/956703" }, { "category": "self", "summary": "SUSE Bug 956711", "url": "https://bugzilla.suse.com/956711" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5283 page", "url": "https://www.suse.com/security/cve/CVE-2015-5283/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-12-04T09:34:09Z", "generator": { "date": "2015-12-04T09:34:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2194-1", "initial_release_date": "2015-12-04T09:34:09Z", "revision_history": [ { "date": "2015-12-04T09:34:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.51-52.31.1.noarch", "product": { "name": "kernel-devel-3.12.51-52.31.1.noarch", "product_id": "kernel-devel-3.12.51-52.31.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.51-52.31.1.noarch", "product": { "name": "kernel-macros-3.12.51-52.31.1.noarch", "product_id": "kernel-macros-3.12.51-52.31.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.51-52.31.1.noarch", "product": { "name": "kernel-source-3.12.51-52.31.1.noarch", "product_id": "kernel-source-3.12.51-52.31.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.51-52.31.5.noarch", "product": { "name": "kernel-docs-3.12.51-52.31.5.noarch", "product_id": "kernel-docs-3.12.51-52.31.5.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.51-52.31.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.51-52.31.1.ppc64le", "product_id": "kernel-obs-build-3.12.51-52.31.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.51-52.31.1.ppc64le", "product": { "name": "kernel-default-3.12.51-52.31.1.ppc64le", "product_id": "kernel-default-3.12.51-52.31.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.51-52.31.1.ppc64le", "product": { "name": "kernel-default-base-3.12.51-52.31.1.ppc64le", "product_id": "kernel-default-base-3.12.51-52.31.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.51-52.31.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.51-52.31.1.ppc64le", "product_id": "kernel-default-devel-3.12.51-52.31.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.51-52.31.1.ppc64le", "product": { "name": "kernel-syms-3.12.51-52.31.1.ppc64le", "product_id": "kernel-syms-3.12.51-52.31.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.51-52.31.1.s390x", "product": { "name": "kernel-obs-build-3.12.51-52.31.1.s390x", "product_id": "kernel-obs-build-3.12.51-52.31.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.51-52.31.1.s390x", "product": { "name": "kernel-default-3.12.51-52.31.1.s390x", "product_id": "kernel-default-3.12.51-52.31.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.51-52.31.1.s390x", "product": { "name": "kernel-default-base-3.12.51-52.31.1.s390x", "product_id": "kernel-default-base-3.12.51-52.31.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.51-52.31.1.s390x", "product": { "name": "kernel-default-devel-3.12.51-52.31.1.s390x", "product_id": "kernel-default-devel-3.12.51-52.31.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.51-52.31.1.s390x", "product": { "name": "kernel-default-man-3.12.51-52.31.1.s390x", "product_id": "kernel-default-man-3.12.51-52.31.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.51-52.31.1.s390x", "product": { "name": "kernel-syms-3.12.51-52.31.1.s390x", "product_id": "kernel-syms-3.12.51-52.31.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-default-3.12.51-52.31.1.x86_64", "product_id": "kernel-default-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-default-devel-3.12.51-52.31.1.x86_64", "product_id": "kernel-default-devel-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-default-extra-3.12.51-52.31.1.x86_64", "product_id": "kernel-default-extra-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-syms-3.12.51-52.31.1.x86_64", "product_id": "kernel-syms-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-xen-3.12.51-52.31.1.x86_64", "product_id": "kernel-xen-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.51-52.31.1.x86_64", "product_id": "kernel-xen-devel-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-ec2-3.12.51-52.31.1.x86_64", "product_id": "kernel-ec2-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.51-52.31.1.x86_64", "product_id": "kernel-ec2-devel-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.51-52.31.1.x86_64", "product_id": "kernel-ec2-extra-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-obs-build-3.12.51-52.31.1.x86_64", "product_id": "kernel-obs-build-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-default-base-3.12.51-52.31.1.x86_64", "product_id": "kernel-default-base-3.12.51-52.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.51-52.31.1.x86_64", "product": { "name": "kernel-xen-base-3.12.51-52.31.1.x86_64", "product_id": "kernel-xen-base-3.12.51-52.31.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.51-52.31.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch" }, "product_reference": "kernel-devel-3.12.51-52.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.51-52.31.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch" }, "product_reference": "kernel-macros-3.12.51-52.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.51-52.31.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch" }, "product_reference": "kernel-source-3.12.51-52.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-syms-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-xen-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-ec2-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.51-52.31.5.noarch as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch" }, "product_reference": "kernel-docs-3.12.51-52.31.5.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.51-52.31.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.51-52.31.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-obs-build-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-52.31.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le" }, "product_reference": "kernel-default-3.12.51-52.31.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-default-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-52.31.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.51-52.31.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-default-base-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-base-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-52.31.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.51-52.31.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-default-devel-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-default-man-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.51-52.31.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch" }, "product_reference": "kernel-devel-3.12.51-52.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.51-52.31.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch" }, "product_reference": "kernel-macros-3.12.51-52.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.51-52.31.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch" }, "product_reference": "kernel-source-3.12.51-52.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-52.31.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le" }, "product_reference": "kernel-syms-3.12.51-52.31.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-syms-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-syms-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-xen-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-52.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le" }, "product_reference": "kernel-default-3.12.51-52.31.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-default-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-52.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.51-52.31.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-default-base-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-base-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-52.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.51-52.31.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-default-devel-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-default-man-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.51-52.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch" }, "product_reference": "kernel-devel-3.12.51-52.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.51-52.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch" }, "product_reference": "kernel-macros-3.12.51-52.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.51-52.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch" }, "product_reference": "kernel-source-3.12.51-52.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-52.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le" }, "product_reference": "kernel-syms-3.12.51-52.31.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-52.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x" }, "product_reference": "kernel-syms-3.12.51-52.31.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-syms-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-xen-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.51-52.31.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.51-52.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-04T09:34:09Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-04T09:34:09Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-5283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5283" } ], "notes": [ { "category": "general", "text": "The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5283", "url": "https://www.suse.com/security/cve/CVE-2015-5283" }, { "category": "external", "summary": "SUSE Bug 947155 for CVE-2015-5283", "url": "https://bugzilla.suse.com/947155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-04T09:34:09Z", "details": "moderate" } ], "title": "CVE-2015-5283" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-04T09:34:09Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-04T09:34:09Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-04T09:34:09Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-04T09:34:09Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.51-52.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.51-52.31.5.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.51-52.31.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.51-52.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-04T09:34:09Z", "details": "critical" } ], "title": "CVE-2015-8104" } ] }
suse-su-2015:2339-1
Vulnerability from csaf_suse
Published
2015-12-22 11:37
Modified
2015-12-22 11:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bnc#938706).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).
The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- Driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- Drivers: hv: do not do hypercalls when hypercall_page is NULL.
- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- Drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- Drivers: hv: vmbus: Get rid of some unused definitions.
- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- Drivers: hv: vmbus: add special crash handler (bnc#930770).
- Drivers: hv: vmbus: add special kexec handler.
- Drivers: hv: vmbus: kill tasklets on module unload.
- Drivers: hv: vmbus: prefer '^A' notification chain to 'panic'.
- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- Drivers: hv: vmbus: unregister panic notifier on module unload.
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SUNRPC refactor rpcauth_checkverf error returns (bsc#955673).
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#946214).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957,).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- memory-failure: do code refactor of soft_offline_page() (bnc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950).
- mm: remove GFP_THISNODE (bsc#954950).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS).
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984).
- s390/pci: handle events for unused functions (bnc#946214).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214).
- s390/pci: improve state check when processing hotplug events (bnc#946214).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
Patchnames
sdksp4-kernel-source-12278,sledsp4-kernel-source-12278,slessp4-kernel-source-12278,slexsp3-kernel-source-12278
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash (bsc#956709).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).\n- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).\n- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bnc#938706).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).\n\nThe following non-security bugs were fixed:\n- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- Driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).\n- Drivers: hv: do not do hypercalls when hypercall_page is NULL.\n- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.\n- Drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.\n- Drivers: hv: vmbus: Get rid of some unused definitions.\n- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.\n- Drivers: hv: vmbus: add special crash handler (bnc#930770).\n- Drivers: hv: vmbus: add special kexec handler.\n- Drivers: hv: vmbus: kill tasklets on module unload.\n- Drivers: hv: vmbus: prefer \u0027^A\u0027 notification chain to \u0027panic\u0027.\n- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().\n- Drivers: hv: vmbus: unregister panic notifier on module unload.\n- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).\n- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).\n- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).\n- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- NFSv4: Fix two infinite loops in the mount code (bsc#954628).\n- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).\n- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).\n- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).\n- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).\n- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).\n- PCI: delay configuration of SRIOV capability (bnc#952084).\n- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).\n- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)\n- SUNRPC refactor rpcauth_checkverf error returns (bsc#955673).\n- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#946214).\n- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).\n- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).\n- blktap: refine mm tracking (bsc#952976).\n- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- dm-snap: avoid deadock on s-\u003elock when a read is split (bsc#939826).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).\n- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- fix lpfc_send_rscn_event allocation size claims bnc#935757\n- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).\n- fs: Fix deadlocks between sync and fs freezing (bsc#935123).\n- hugetlb: simplify migrate_huge_page() (bnc#947957).\n- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957,).\n- ipr: Fix incorrect trace indexing (bsc#940913).\n- ipr: Fix invalid array indexing for HRRQ (bsc#940913).\n- ipv6: fix tunnel error handling (bsc#952579).\n- ipvs: Fix reuse connection if real server is dead (bnc#945827).\n- ipvs: drop first packet to dead server (bsc#946078).\n- kernel: correct uc_sigmask of the compat signal frame (bnc#946214).\n- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214).\n- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).\n- ktime: add ktime_after and ktime_before helpe (bsc#904348).\n- lib/string.c: introduce memchr_inv() (bnc#930788).\n- lpfc: Fix cq_id masking problem (bsc#944677).\n- macvlan: Support bonding events bsc#948521\n- memory-failure: do code refactor of soft_offline_page() (bnc#947957).\n- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957).\n- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957).\n- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957).\n- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957).\n- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957).\n- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957).\n- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).\n- mm: fix GFP_THISNODE callers and clarify (bsc#954950).\n- mm: remove GFP_THISNODE (bsc#954950).\n- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS).\n- net/core: Add VF link state control policy (bsc#950298).\n- netfilter: xt_recent: fix namespace destroy path (bsc#879378).\n- panic/x86: Allow cpus to save registers even if they (bnc#940946).\n- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).\n- pktgen: clean up ktime_t helpers (bsc#904348).\n- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).\n- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).\n- qla2xxx: Remove unavailable firmware files (bsc#921081).\n- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).\n- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).\n- quota: Fix deadlock with suspend and quotas (bsc#935123).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).\n- rtnetlink: Fix VF IFLA policy (bsc#950298).\n- rtnetlink: fix VF info size (bsc#950298).\n- s390/dasd: fix disconnected device with valid path mask (bnc#946214).\n- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954984).\n- s390/pci: handle events for unused functions (bnc#946214).\n- s390/pci: improve handling of hotplug event 0x301 (bnc#946214).\n- s390/pci: improve state check when processing hotplug events (bnc#946214).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- sg: fix read() error reporting (bsc#926774).\n- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).\n- usbback: correct copy length for partial transfers (bsc#941202).\n- usbvision fix overflow of interfaces array (bnc#950998).\n- veth: extend device features (bsc#879381).\n- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).\n- vmxnet3: adjust ring sizes when interface is down (bsc#950750).\n- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).\n- writeback: Skip writeback for frozen filesystem (bsc#935123).\n- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).\n- x86/evtchn: make use of PHYSDEVOP_map_pirq.\n- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).\n- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).\n- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).\n- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).\n- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).\n- xfs: add background scanning to clear eofblocks inodes (bnc#930788).\n- xfs: add inode id filtering to eofblocks scan (bnc#930788).\n- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).\n- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).\n- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).\n- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).\n- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).\n- xfs: support a tag-based inode_ag_iterator (bnc#930788).\n- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).\n- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).\n- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).\n- xhci: Calculate old endpoints correctly on device reset (bnc#944831).\n- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).\n- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).\n- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).\n- xhci: silence TD warning (bnc#939955).\n- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-source-12278,sledsp4-kernel-source-12278,slessp4-kernel-source-12278,slexsp3-kernel-source-12278", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2339-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2339-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152339-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2339-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 879378", "url": "https://bugzilla.suse.com/879378" }, { "category": "self", "summary": "SUSE Bug 879381", "url": "https://bugzilla.suse.com/879381" }, { "category": "self", "summary": "SUSE Bug 900610", "url": "https://bugzilla.suse.com/900610" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 904965", "url": "https://bugzilla.suse.com/904965" }, { "category": "self", "summary": "SUSE Bug 921081", "url": "https://bugzilla.suse.com/921081" }, { "category": "self", "summary": "SUSE Bug 926774", "url": "https://bugzilla.suse.com/926774" }, { "category": "self", "summary": "SUSE Bug 930145", "url": "https://bugzilla.suse.com/930145" }, { "category": "self", "summary": "SUSE Bug 930770", "url": "https://bugzilla.suse.com/930770" }, { "category": "self", "summary": "SUSE Bug 930788", "url": "https://bugzilla.suse.com/930788" }, { "category": "self", "summary": "SUSE Bug 930835", "url": "https://bugzilla.suse.com/930835" }, { "category": "self", "summary": "SUSE Bug 932805", "url": "https://bugzilla.suse.com/932805" }, { "category": "self", "summary": "SUSE Bug 935123", "url": "https://bugzilla.suse.com/935123" }, { "category": "self", "summary": "SUSE Bug 935757", "url": "https://bugzilla.suse.com/935757" }, { "category": "self", "summary": "SUSE Bug 937256", "url": "https://bugzilla.suse.com/937256" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 938706", "url": "https://bugzilla.suse.com/938706" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 939955", "url": "https://bugzilla.suse.com/939955" }, { "category": "self", "summary": "SUSE Bug 940017", "url": "https://bugzilla.suse.com/940017" }, { "category": "self", "summary": "SUSE Bug 940913", "url": "https://bugzilla.suse.com/940913" }, { "category": "self", "summary": "SUSE Bug 940946", "url": "https://bugzilla.suse.com/940946" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 942938", "url": "https://bugzilla.suse.com/942938" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 944296", "url": "https://bugzilla.suse.com/944296" }, { "category": "self", "summary": "SUSE Bug 944677", "url": "https://bugzilla.suse.com/944677" }, { "category": "self", "summary": "SUSE Bug 944831", "url": "https://bugzilla.suse.com/944831" }, { "category": "self", "summary": "SUSE Bug 944837", "url": "https://bugzilla.suse.com/944837" }, { "category": "self", "summary": "SUSE Bug 944989", "url": "https://bugzilla.suse.com/944989" }, { "category": "self", "summary": "SUSE Bug 944993", "url": "https://bugzilla.suse.com/944993" }, { "category": "self", "summary": "SUSE Bug 945691", "url": "https://bugzilla.suse.com/945691" }, { "category": "self", "summary": "SUSE Bug 945825", "url": "https://bugzilla.suse.com/945825" }, { "category": "self", "summary": "SUSE Bug 945827", "url": "https://bugzilla.suse.com/945827" }, { "category": "self", "summary": "SUSE Bug 946078", "url": "https://bugzilla.suse.com/946078" }, { "category": "self", "summary": "SUSE Bug 946214", "url": "https://bugzilla.suse.com/946214" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 947957", "url": "https://bugzilla.suse.com/947957" }, { "category": "self", "summary": "SUSE Bug 948330", "url": "https://bugzilla.suse.com/948330" }, { "category": "self", "summary": "SUSE Bug 948347", "url": "https://bugzilla.suse.com/948347" }, { "category": "self", "summary": "SUSE Bug 948521", "url": "https://bugzilla.suse.com/948521" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949298", "url": "https://bugzilla.suse.com/949298" }, { "category": "self", "summary": "SUSE Bug 949502", "url": "https://bugzilla.suse.com/949502" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949936", "url": "https://bugzilla.suse.com/949936" }, { "category": "self", "summary": "SUSE Bug 949981", "url": "https://bugzilla.suse.com/949981" }, { "category": "self", "summary": "SUSE Bug 950298", "url": "https://bugzilla.suse.com/950298" }, { "category": "self", "summary": "SUSE Bug 950750", "url": "https://bugzilla.suse.com/950750" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 952084", "url": "https://bugzilla.suse.com/952084" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952579", "url": "https://bugzilla.suse.com/952579" }, { "category": "self", "summary": "SUSE Bug 952976", "url": "https://bugzilla.suse.com/952976" }, { "category": "self", "summary": "SUSE Bug 953527", "url": "https://bugzilla.suse.com/953527" }, { "category": "self", "summary": "SUSE Bug 953799", "url": "https://bugzilla.suse.com/953799" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954404", "url": "https://bugzilla.suse.com/954404" }, { "category": "self", "summary": "SUSE Bug 954628", "url": "https://bugzilla.suse.com/954628" }, { "category": "self", "summary": "SUSE Bug 954950", "url": "https://bugzilla.suse.com/954950" }, { "category": "self", "summary": "SUSE Bug 954984", "url": "https://bugzilla.suse.com/954984" }, { "category": "self", "summary": "SUSE Bug 955673", "url": "https://bugzilla.suse.com/955673" }, { "category": "self", "summary": "SUSE Bug 956709", "url": "https://bugzilla.suse.com/956709" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5157 page", "url": "https://www.suse.com/security/cve/CVE-2015-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5307 page", "url": "https://www.suse.com/security/cve/CVE-2015-5307/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7509 page", "url": "https://www.suse.com/security/cve/CVE-2015-7509/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8104 page", "url": "https://www.suse.com/security/cve/CVE-2015-8104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-12-22T11:37:06Z", "generator": { "date": "2015-12-22T11:37:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2339-1", "initial_release_date": "2015-12-22T11:37:06Z", "revision_history": [ { "date": "2015-12-22T11:37:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.i586", "product": { "name": "kernel-default-3.0.101-68.1.i586", "product_id": "kernel-default-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.i586", "product": { "name": "kernel-default-base-3.0.101-68.1.i586", "product_id": "kernel-default-base-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.i586", "product": { "name": "kernel-default-devel-3.0.101-68.1.i586", "product_id": "kernel-default-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-68.1.i586", "product": { "name": "kernel-default-extra-3.0.101-68.1.i586", "product_id": "kernel-default-extra-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-68.1.i586", "product": { "name": "kernel-pae-3.0.101-68.1.i586", "product_id": "kernel-pae-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-68.1.i586", "product": { "name": "kernel-pae-base-3.0.101-68.1.i586", "product_id": "kernel-pae-base-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-68.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-68.1.i586", "product_id": "kernel-pae-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-extra-3.0.101-68.1.i586", "product": { "name": "kernel-pae-extra-3.0.101-68.1.i586", "product_id": "kernel-pae-extra-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.i586", "product": { "name": "kernel-source-3.0.101-68.1.i586", "product_id": "kernel-source-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.i586", "product": { "name": "kernel-syms-3.0.101-68.1.i586", "product_id": "kernel-syms-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-68.1.i586", "product_id": "kernel-trace-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-68.1.i586", "product": { "name": "kernel-xen-3.0.101-68.1.i586", "product_id": "kernel-xen-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-68.1.i586", "product": { "name": "kernel-xen-base-3.0.101-68.1.i586", "product_id": "kernel-xen-base-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-68.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-68.1.i586", "product_id": "kernel-xen-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-68.1.i586", "product": { "name": "kernel-xen-extra-3.0.101-68.1.i586", "product_id": "kernel-xen-extra-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-68.1.i586", "product": { "name": "kernel-ec2-3.0.101-68.1.i586", "product_id": "kernel-ec2-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-68.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-68.1.i586", "product_id": "kernel-ec2-base-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-68.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-68.1.i586", "product_id": "kernel-ec2-devel-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.i586", "product": { "name": "kernel-trace-3.0.101-68.1.i586", "product_id": "kernel-trace-3.0.101-68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.i586", "product": { "name": "kernel-trace-base-3.0.101-68.1.i586", "product_id": "kernel-trace-base-3.0.101-68.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.ia64", "product": { "name": "kernel-default-3.0.101-68.1.ia64", "product_id": "kernel-default-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.ia64", "product": { "name": "kernel-default-base-3.0.101-68.1.ia64", "product_id": "kernel-default-base-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-68.1.ia64", "product_id": "kernel-default-devel-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.ia64", "product": { "name": "kernel-source-3.0.101-68.1.ia64", "product_id": "kernel-source-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.ia64", "product": { "name": "kernel-syms-3.0.101-68.1.ia64", "product_id": "kernel-syms-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.ia64", "product": { "name": "kernel-trace-3.0.101-68.1.ia64", "product_id": "kernel-trace-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-68.1.ia64", "product_id": "kernel-trace-base-3.0.101-68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-68.1.ia64", "product_id": "kernel-trace-devel-3.0.101-68.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-68.2.noarch", "product": { "name": "kernel-docs-3.0.101-68.2.noarch", "product_id": "kernel-docs-3.0.101-68.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.ppc64", "product": { "name": "kernel-default-3.0.101-68.1.ppc64", "product_id": "kernel-default-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-68.1.ppc64", "product_id": "kernel-default-base-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-68.1.ppc64", "product_id": "kernel-default-devel-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-68.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-68.1.ppc64", "product_id": "kernel-ppc64-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-68.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-68.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-68.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-68.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.ppc64", "product": { "name": "kernel-source-3.0.101-68.1.ppc64", "product_id": "kernel-source-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.ppc64", "product": { "name": "kernel-syms-3.0.101-68.1.ppc64", "product_id": "kernel-syms-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.ppc64", "product": { "name": "kernel-trace-3.0.101-68.1.ppc64", "product_id": "kernel-trace-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-68.1.ppc64", "product_id": "kernel-trace-base-3.0.101-68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-68.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-68.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.s390x", "product": { "name": "kernel-default-3.0.101-68.1.s390x", "product_id": "kernel-default-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.s390x", "product": { "name": "kernel-default-base-3.0.101-68.1.s390x", "product_id": "kernel-default-base-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-68.1.s390x", "product_id": "kernel-default-devel-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-68.1.s390x", "product": { "name": "kernel-default-man-3.0.101-68.1.s390x", "product_id": "kernel-default-man-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.s390x", "product": { "name": "kernel-source-3.0.101-68.1.s390x", "product_id": "kernel-source-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.s390x", "product": { "name": "kernel-syms-3.0.101-68.1.s390x", "product_id": "kernel-syms-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.s390x", "product": { "name": "kernel-trace-3.0.101-68.1.s390x", "product_id": "kernel-trace-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-68.1.s390x", "product_id": "kernel-trace-base-3.0.101-68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-68.1.s390x", "product_id": "kernel-trace-devel-3.0.101-68.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-68.1.x86_64", "product": { "name": "kernel-default-3.0.101-68.1.x86_64", "product_id": "kernel-default-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-68.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-68.1.x86_64", "product_id": "kernel-default-base-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-68.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-68.1.x86_64", "product_id": "kernel-default-devel-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-68.1.x86_64", "product": { "name": "kernel-default-extra-3.0.101-68.1.x86_64", "product_id": "kernel-default-extra-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-68.1.x86_64", "product": { "name": "kernel-source-3.0.101-68.1.x86_64", "product_id": "kernel-source-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-68.1.x86_64", "product": { "name": "kernel-syms-3.0.101-68.1.x86_64", "product_id": "kernel-syms-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-68.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-68.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-68.1.x86_64", "product": { "name": "kernel-xen-3.0.101-68.1.x86_64", "product_id": "kernel-xen-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-68.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-68.1.x86_64", "product_id": "kernel-xen-base-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-68.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-68.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-68.1.x86_64", "product": { "name": "kernel-xen-extra-3.0.101-68.1.x86_64", "product_id": "kernel-xen-extra-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-68.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-68.1.x86_64", "product_id": "kernel-ec2-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-68.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-68.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-68.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-68.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-68.1.x86_64", "product": { "name": "kernel-trace-3.0.101-68.1.x86_64", "product_id": "kernel-trace-3.0.101-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-68.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-68.1.x86_64", "product_id": "kernel-trace-base-3.0.101-68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-68.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" }, "product_reference": "kernel-docs-3.0.101-68.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586" }, "product_reference": "kernel-default-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586" }, "product_reference": "kernel-default-extra-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-extra-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-extra-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-extra-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586" }, "product_reference": "kernel-source-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586" }, "product_reference": "kernel-syms-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-extra-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-extra-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-extra-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586" }, "product_reference": "kernel-default-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586" }, "product_reference": "kernel-source-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64" }, "product_reference": "kernel-source-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64" }, "product_reference": "kernel-source-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x" }, "product_reference": "kernel-source-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586" }, "product_reference": "kernel-syms-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64" }, "product_reference": "kernel-syms-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x" }, "product_reference": "kernel-syms-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586" }, "product_reference": "kernel-default-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586" }, "product_reference": "kernel-source-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64" }, "product_reference": "kernel-source-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64" }, "product_reference": "kernel-source-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x" }, "product_reference": "kernel-source-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586" }, "product_reference": "kernel-syms-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64" }, "product_reference": "kernel-syms-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x" }, "product_reference": "kernel-syms-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5157" } ], "notes": [ { "category": "general", "text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5157", "url": "https://www.suse.com/security/cve/CVE-2015-5157" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-5157", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 937969 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937969" }, { "category": "external", "summary": "SUSE Bug 937970 for CVE-2015-5157", "url": "https://bugzilla.suse.com/937970" }, { "category": "external", "summary": "SUSE Bug 938706 for CVE-2015-5157", "url": "https://bugzilla.suse.com/938706" }, { "category": "external", "summary": "SUSE Bug 939207 for CVE-2015-5157", "url": "https://bugzilla.suse.com/939207" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "important" } ], "title": "CVE-2015-5157" }, { "cve": "CVE-2015-5307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5307" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5307", "url": "https://www.suse.com/security/cve/CVE-2015-5307" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-5307", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-5307", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-5307", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-5307" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7509" } ], "notes": [ { "category": "general", "text": "fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7509", "url": "https://www.suse.com/security/cve/CVE-2015-7509" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7509", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 956707 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956707" }, { "category": "external", "summary": "SUSE Bug 956709 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956709" }, { "category": "external", "summary": "SUSE Bug 956766 for CVE-2015-7509", "url": "https://bugzilla.suse.com/956766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "moderate" } ], "title": "CVE-2015-7509" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8104" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8104", "url": "https://www.suse.com/security/cve/CVE-2015-8104" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2015-8104", "url": "https://bugzilla.suse.com/1215748" }, { "category": "external", "summary": "SUSE Bug 953527 for CVE-2015-8104", "url": "https://bugzilla.suse.com/953527" }, { "category": "external", "summary": "SUSE Bug 954018 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954018" }, { "category": "external", "summary": "SUSE Bug 954404 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954404" }, { "category": "external", "summary": "SUSE Bug 954405 for CVE-2015-8104", "url": "https://bugzilla.suse.com/954405" }, { "category": "external", "summary": "SUSE Bug 962977 for CVE-2015-8104", "url": "https://bugzilla.suse.com/962977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "critical" } ], "title": "CVE-2015-8104" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-default-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-pae-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:kernel-xen-extra-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-68.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2015-12-22T11:37:06Z", "details": "low" } ], "title": "CVE-2015-8215" } ] }
suse-su-2016:0383-1
Vulnerability from csaf_suse
Published
2016-02-08 13:45
Modified
2016-02-08 13:45
Summary
Security update for kernel live patch 5
Notes
Title of the patch
Security update for kernel live patch 5
Description of the patch
This kernel live patch for Linux Kernel 3.12.43-52.6.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-219
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 5", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.43-52.6.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-219", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0383-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0383-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160383-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0383-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001858.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 5", "tracking": { "current_release_date": "2016-02-08T13:45:42Z", "generator": { "date": "2016-02-08T13:45:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0383-1", "initial_release_date": "2016-02-08T13:45:42Z", "revision_history": [ { "date": "2016-02-08T13:45:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:42Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0381-1
Vulnerability from csaf_suse
Published
2016-02-08 13:45
Modified
2016-02-08 13:45
Summary
Security update for kernel live patch 4
Notes
Title of the patch
Security update for kernel live patch 4
Description of the patch
This kernel live patch for Linux Kernel 3.12.39-47.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-220
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 4", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.39-47.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-220", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0381-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0381-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160381-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0381-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001857.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 4", "tracking": { "current_release_date": "2016-02-08T13:45:50Z", "generator": { "date": "2016-02-08T13:45:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0381-1", "initial_release_date": "2016-02-08T13:45:50Z", "revision_history": [ { "date": "2016-02-08T13:45:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_39-47-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:45:50Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
suse-su-2016:0384-1
Vulnerability from csaf_suse
Published
2016-02-08 13:46
Modified
2016-02-08 13:46
Summary
Security update for kernel live patch 2
Notes
Title of the patch
Security update for kernel live patch 2
Description of the patch
This kernel live patch for Linux Kernel 3.12.36-38.1 fixes security issues and bugs:
Security issues fixed:
- CVE-2015-8539: A negatively instantiated user key could have been used
by a local user to leverage privileges (bnc#958601).
- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable
Datagram Sockets (RDS) implementation allowing a local user to cause
system DoS. A verification was missing that the underlying transport
exists when a connection was created. (bsc#953052)
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#953052).
- CVE-2015-7872: Possible crash when trying to garbage collect an
uninstantiated keyring (bsc#951542).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#951625).
Non-security bugfix were also done:
- xfs: Fix lost direct IO write in the last block (bsc#954005).
- simple fix in kallsyms initialization (bsc#940342 bsc#916225)
Patchnames
SUSE-SLE-Live-Patching-12-2016-224
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel live patch 2", "title": "Title of the patch" }, { "category": "description", "text": "\nThis kernel live patch for Linux Kernel 3.12.36-38.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n Datagram Sockets (RDS) implementation allowing a local user to cause\n system DoS. A verification was missing that the underlying transport\n exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-224", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0384-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0384-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160384-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0384-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001859.html" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 940342", "url": "https://bugzilla.suse.com/940342" }, { "category": "self", "summary": "SUSE Bug 951542", "url": "https://bugzilla.suse.com/951542" }, { "category": "self", "summary": "SUSE Bug 951625", "url": "https://bugzilla.suse.com/951625" }, { "category": "self", "summary": "SUSE Bug 953052", "url": "https://bugzilla.suse.com/953052" }, { "category": "self", "summary": "SUSE Bug 954005", "url": "https://bugzilla.suse.com/954005" }, { "category": "self", "summary": "SUSE Bug 958601", "url": "https://bugzilla.suse.com/958601" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6937 page", "url": "https://www.suse.com/security/cve/CVE-2015-6937/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" } ], "title": "Security update for kernel live patch 2", "tracking": { "current_release_date": "2016-02-08T13:46:19Z", "generator": { "date": "2016-02-08T13:46:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0384-1", "initial_release_date": "2016-02-08T13:46:19Z", "revision_history": [ { "date": "2016-02-08T13:46:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_36-38-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-6937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6937" } ], "notes": [ { "category": "general", "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6937", "url": "https://www.suse.com/security/cve/CVE-2015-6937" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-6937", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-6937", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-6937", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-6937", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-6937", "url": "https://bugzilla.suse.com/953052" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-6937", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "low" } ], "title": "CVE-2015-6937" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_36-38-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-08T13:46:19Z", "details": "important" } ], "title": "CVE-2015-8539" } ] }
fkie_cve-2015-7990
Vulnerability from fkie_nvd
Published
2015-12-28 11:59
Modified
2025-04-12 10:46
Severity ?
Summary
Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html | ||
cve@mitre.org | http://www.debian.org/security/2015/dsa-3396 | ||
cve@mitre.org | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3 | Vendor Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/10/27/5 | ||
cve@mitre.org | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/77340 | ||
cve@mitre.org | http://www.securitytracker.com/id/1034453 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2886-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2887-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2887-2 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2888-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2889-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2889-2 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2890-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2890-2 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2890-3 | ||
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1276437 | ||
cve@mitre.org | https://bugzilla.suse.com/show_bug.cgi?id=952384 | ||
cve@mitre.org | https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a | ||
cve@mitre.org | https://lkml.org/lkml/2015/10/16/530 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3396 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/10/27/5 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/77340 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034453 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2886-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2887-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2887-2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2888-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2889-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2889-2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2890-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2890-2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2890-3 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1276437 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.suse.com/show_bug.cgi?id=952384 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lkml.org/lkml/2015/10/16/530 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "17376827-DFED-4E71-8D4A-5E5C44073D57", "versionEndIncluding": "4.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937." }, { "lang": "es", "value": "Condici\u00f3n de carrera en la funci\u00f3n rds_sendmsg en net/rds/sendmsg.c en el kernel de Linux en versiones anteriores a 4.3.3 permite a usuarios locales provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda del sistema) o posiblemente tener otro impacto no especificado mediante el uso de un socket que no estaba vinculado adecuadamente. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2015-6937" } ], "id": "CVE-2015-7990", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2015-12-28T11:59:04.200", "references": [ { "source": "cve@mitre.org", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3396" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/10/27/5" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/77340" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1034453" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2886-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2887-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2887-2" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2888-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2889-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2889-2" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2890-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2890-2" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2890-3" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437" }, { "source": "cve@mitre.org", "url": "https://bugzilla.suse.com/show_bug.cgi?id=952384" }, { "source": "cve@mitre.org", "url": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a" }, { "source": "cve@mitre.org", "url": "https://lkml.org/lkml/2015/10/16/530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/10/27/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/77340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2886-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2887-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2887-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2888-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2889-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2889-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2890-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2890-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2890-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.suse.com/show_bug.cgi?id=952384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lkml.org/lkml/2015/10/16/530" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-ggf3-232m-5283
Vulnerability from github
Published
2022-05-14 02:21
Modified
2022-05-14 02:21
Severity ?
VLAI Severity ?
Details
Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
{ "affected": [], "aliases": [ "CVE-2015-7990" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-12-28T11:59:00Z", "severity": "MODERATE" }, "details": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "id": "GHSA-ggf3-232m-5283", "modified": "2022-05-14T02:21:22Z", "published": "2022-05-14T02:21:22Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7990" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=952384" }, { "type": "WEB", "url": "https://lkml.org/lkml/2015/10/16/530" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3396" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2015/10/27/5" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/77340" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1034453" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2886-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2887-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2887-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2888-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2889-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2889-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2890-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2890-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2890-3" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "type": "CVSS_V3" } ] }
gsd-2015-7990
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-7990", "description": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "id": "GSD-2015-7990", "references": [ "https://www.suse.com/security/cve/CVE-2015-7990.html", "https://www.debian.org/security/2015/dsa-3396", "https://ubuntu.com/security/CVE-2015-7990" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-7990" ], "details": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "id": "GSD-2015-7990", "modified": "2023-12-13T01:20:01.560123Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2015:2292", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" }, { "name": "SUSE-SU-2016:0337", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2015:2350", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437" }, { "name": "SUSE-SU-2016:0434", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "USN-2887-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2887-2" }, { "name": "[linux-kernel] 20151016 [PATCH] RDS: fix race condition when sending a message on unbound socket.", "refsource": "MLIST", "url": "https://lkml.org/lkml/2015/10/16/530" }, { "name": "1034453", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034453" }, { "name": "USN-2886-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2886-1" }, { "name": "USN-2887-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2887-1" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=952384", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=952384" }, { "name": "SUSE-SU-2015:2194", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" }, { "name": "USN-2890-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2890-3" }, { "name": "openSUSE-SU-2015:2232", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "SUSE-SU-2016:0380", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "USN-2889-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2889-1" }, { "name": "SUSE-SU-2016:0354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2016:0335", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "SUSE-SU-2015:2339", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "SUSE-SU-2015:2108", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "name": "USN-2889-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2889-2" }, { "name": "[oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/10/27/5" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3" }, { "name": "SUSE-SU-2016:0383", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "name": "SUSE-SU-2016:0386", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "SUSE-SU-2016:2074", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "USN-2890-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2890-2" }, { "name": "77340", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77340" }, { "name": "SUSE-SU-2016:0384", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "DSA-3396", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3396" }, { "name": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "USN-2890-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2890-1" }, { "name": "SUSE-SU-2016:0387", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "SUSE-SU-2016:0381", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "name": "USN-2888-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2888-1" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.3.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7990" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-362" } ] } ] }, "references": { "reference_data": [ { "name": "[linux-kernel] 20151016 [PATCH] RDS: fix race condition when sending a message on unbound socket.", "refsource": "MLIST", "tags": [], "url": "https://lkml.org/lkml/2015/10/16/530" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276437" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a", "refsource": "CONFIRM", "tags": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=952384", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.suse.com/show_bug.cgi?id=952384" }, { "name": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a" }, { "name": "[oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2015/10/27/5" }, { "name": "SUSE-SU-2016:2074", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "name": "77340", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/77340" }, { "name": "SUSE-SU-2016:0386", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" }, { "name": "USN-2889-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2889-1" }, { "name": "USN-2890-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2890-1" }, { "name": "USN-2890-3", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2890-3" }, { "name": "USN-2887-2", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2887-2" }, { "name": "SUSE-SU-2016:0337", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" }, { "name": "SUSE-SU-2016:0335", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" }, { "name": "USN-2888-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2888-1" }, { "name": "SUSE-SU-2016:0381", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" }, { "name": "USN-2889-2", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2889-2" }, { "name": "SUSE-SU-2016:0380", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" }, { "name": "SUSE-SU-2016:0384", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" }, { "name": "USN-2890-2", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2890-2" }, { "name": "SUSE-SU-2016:0387", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" }, { "name": "USN-2887-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2887-1" }, { "name": "SUSE-SU-2016:0434", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" }, { "name": "USN-2886-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2886-1" }, { "name": "SUSE-SU-2016:0383", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" }, { "name": "SUSE-SU-2016:0354", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" }, { "name": "SUSE-SU-2015:2108", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" }, { "name": "DSA-3396", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2015/dsa-3396" }, { "name": "SUSE-SU-2015:2194", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" }, { "name": "SUSE-SU-2015:2339", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" }, { "name": "openSUSE-SU-2015:2232", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" }, { "name": "1034453", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1034453" }, { "name": "SUSE-SU-2015:2350", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" }, { "name": "SUSE-SU-2015:2292", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM" }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 4.7 } }, "lastModifiedDate": "2018-10-17T01:29Z", "publishedDate": "2015-12-28T11:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…