suse-su-2015:0658-1
Vulnerability from csaf_suse
Published
2015-03-26 17:36
Modified
2015-03-26 17:36
Summary
Security Update for Linux Kernel

Notes

Title of the patch
Security Update for Linux Kernel
Description of the patch
The SUSE Linux Enterprise Server 12 kernel was updated to 3.12.39 to receive various security and bugfixes. Following security bugs were fixed: - CVE-2015-0777: The XEN usb backend could leak information to the guest system due to copying uninitialized memory. - CVE-2015-2150: Xen and the Linux kernel did not properly restrict access to PCI command registers, which might have allowed local guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. The following non-security bugs were fixed: - Added Little Endian support to vtpm module (bsc#918620). - Add support for pnfs block layout. Patches not included by default yet - ALSA: hda - Fix regression of HD-audio controller fallback modes (bsc#921313). - btrfs: add missing blk_finish_plug in btrfs_sync_log() (bnc#922284). - btrfs: cleanup orphans while looking up default subvolume (bsc#914818). - btrfs: do not ignore errors from btrfs_lookup_xattr in do_setxattr (bnc#922272). - btrfs: fix BUG_ON in btrfs_orphan_add() when delete unused block group (bnc#922278). - btrfs: fix data loss in the fast fsync path (bnc#922275). - btrfs: fix fsync data loss after adding hard link to inode (bnc#922275). - cgroup: revert cgroup_mutex removal from idr_remove (bnc#918644). - cifs: fix use-after-free bug in find_writable_file (bnc#909477). - crypto: rng - RNGs must return 0 in success case (bsc#920805). - crypto: testmgr - fix RNG return code enforcement (bsc#920805). - exit: Always reap resource stats in __exit_signal() (Time scalability). - fork: report pid reservation failure properly (bnc#909684). - fsnotify: Fix handling of renames in audit (bnc#915200). - HID: hyperv: match wait_for_completion_timeout return type. - hv: address compiler warnings for hv_fcopy_daemon.c. - hv: address compiler warnings for hv_kvp_daemon.c. - hv: check vmbus_device_create() return value in vmbus_process_offer(). - hv: do not add redundant / in hv_start_fcopy(). - hv: hv_balloon: Do not post pressure status from interrupt context. - hv: hv_balloon: Fix a locking bug in the balloon driver. - hv: hv_balloon: Make adjustments in computing the floor. - hv: hv_fcopy: drop the obsolete message on transfer failure. - hv: kvp_daemon: make IPv6-only-injection work. - hv: remove unused bytes_written from kvp_update_file(). - hv: rename sc_lock to the more generic lock. - hv: vmbus: Fix a bug in vmbus_establish_gpadl(). - hv: vmbus: hv_process_timer_expiration() can be static. - hv: vmbus: Implement a clockevent device. - hv: vmbus: serialize Offer and Rescind offer. - hv: vmbus: Support a vmbus API for efficiently sending page arrays. - hv: vmbus: Use get_cpu() to get the current CPU. - hyperv: fix sparse warnings. - hyperv: Fix the error processing in netvsc_send(). - hyperv: match wait_for_completion_timeout return type. - hyperv: netvsc.c: match wait_for_completion_timeout return type. - iommu/vt-d: Fix dmar_domain leak in iommu_attach_device (bsc#924460). - kabi, mm: prevent endless growth of anon_vma hierarchy (bnc#904242). - kABI: protect linux/namei.h include in procfs. - kABI: protect struct hif_scatter_req. - kabi/severities: Stop maintaining the kgraft kabi - kernel/sched/clock.c: add another clock for use with the soft lockup watchdog (bsc#919939). - kgr: Allow patches to require an exact kernel version (bnc#920615). - KVM: PPC: Book3S HV: ptes are big endian (bsc#920839). - mm: convert the rest to new page table lock api (the suse-only cases) (fate#315482). - mm: fix anon_vma->degree underflow in anon_vma endless growing prevention (bnc#904242). - mm: fix corner case in anon_vma endless growing prevention (bnc#904242). - mm: prevent endless growth of anon_vma hierarchy (bnc#904242). - mm: prevent endless growth of anon_vma hierarchy mm: prevent endless growth of anon_vma hierarchy (bnc#904242). - mm: vmscan: count only dirty pages as congested (VM Performance, bnc#910517). - module: Clean up ro/nx after early module load failures (bsc#921990). - module: set nx before marking module MODULE_STATE_COMING (bsc#921990). - net: add sysfs helpers for netdev_adjacent logic (bnc#915660). - net: correct error path in rtnl_newlink() (bnc#915660). - net: fix creation adjacent device symlinks (bnc#915660). - net: prevent of emerging cross-namespace symlinks (bnc#915660). - net: rename sysfs symlinks on device name change (bnc#915660). - nfs: cap request size to fit a kmalloced page array (bnc#898675). - nfs: commit layouts in fdatasync (bnc#898675). - NFSv4.1: Do not trust attributes if a pNFS LAYOUTCOMMIT is outstanding (bnc#898675). - NFSv4.1: Ensure that the layout recall callback matches layout stateids (bnc#898675). - NFSv4.1: Ensure that we free existing layout segments if we get a new layout (bnc#898675). - NFSv4.1: Fix a race in nfs4_write_inode (bnc#898675). - NFSv4.1: Fix wraparound issues in pnfs_seqid_is_newer() (bnc#898675). - NFSv4.1: Minor optimisation in get_layout_by_fh_locked() (bnc#898675). - NFSv4: Do not update the open stateid unless it is newer than the old one (bnc#898675). - pnfs: add a common GETDEVICELIST implementation (bnc#898675). - pnfs: add a nfs4_get_deviceid helper (bnc#898675). - pnfs: add flag to force read-modify-write in ->write_begin (bnc#898675). - pnfs: add return_range method (bnc#898675). - pnfs: allow splicing pre-encoded pages into the layoutcommit args (bnc#898675). - pnfs: avoid using stale stateids after layoutreturn (bnc#898675). - pnfs/blocklayout: allocate separate pages for the layoutcommit payload (bnc#898675). - pnfs/blocklayout: correctly decrement extent length (bnc#898675). - pnfs/blocklayout: do not set pages uptodate (bnc#898675). - pnfs/blocklayout: Fix a 64-bit division/remainder issue in bl_map_stripe (bnc#898675). - pnfs/blocklayout: implement the return_range method (bnc#898675). - pnfs/blocklayout: improve GETDEVICEINFO error reporting (bnc#898675). - pnfs/blocklayout: include vmalloc.h for __vmalloc (bnc#898675). - pnfs/blocklayout: in-kernel GETDEVICEINFO XDR parsing (bnc#898675). - pnfs/blocklayout: move all rpc_pipefs related code into a single file (bnc#898675). - pnfs/blocklayout: move extent processing to blocklayout.c (bnc#898675). - pnfs/blocklayout: plug block queues (bnc#898675). - pnfs/blocklayout: refactor extent processing (bnc#898675). - pnfs/blocklayout: reject pnfs blocksize larger than page size (bnc#898675). - pNFS/blocklayout: Remove a couple of unused variables (bnc#898675). - pnfs/blocklayout: remove read-modify-write handling in bl_write_pagelist (bnc#898675). - pnfs/blocklayout: remove some debugging (bnc#898675). - pnfs/blocklayout: return layouts on setattr (bnc#898675). - pnfs/blocklayout: rewrite extent tracking (bnc#898675). - pnfs/blocklayout: use the device id cache (bnc#898675). - pnfs: do not check sequence on new stateids in layoutget (bnc#898675). - pnfs: do not pass uninitialized lsegs to ->free_lseg (bnc#898675). - pnfs: enable CB_NOTIFY_DEVICEID support (bnc#898675). - pnfs: factor GETDEVICEINFO implementations (bnc#898675). - pnfs: force a layout commit when encountering busy segments during recall (bnc#898675). - pnfs: remove GETDEVICELIST implementation (bnc#898675). - pnfs: retry after a bad stateid error from layoutget (bnc#898675). - powerpc: add running_clock for powerpc to prevent spurious softlockup warnings (bsc#919939). - powerpc/pseries: Fix endian problems with LE migration (bsc#918584). - remove cgroup_mutex around deactivate_super because it might be dangerous. - rtmutex: Document pi chain walk (mutex scalability). - rtmutex: No need to keep task ref for lock owner check (mutex scalability). - rtmutex: Simplify rtmutex_slowtrylock() (mutex scalability). - rtnetlink: fix a memory leak when ->newlink fails (bnc#915660). - sched: Change thread_group_cputime() to use for_each_thread() (Time scalability). - sched: replace INIT_COMPLETION with reinit_completion. - sched, time: Atomically increment stime & utime (Time scalability). - scsi: storvsc: Always send on the selected outgoing channel. - scsi: storvsc: Do not assume that the scatterlist is not chained. - scsi: storvsc: Enable clustering. - scsi: storvsc: Fix a bug in copy_from_bounce_buffer(). - scsi: storvsc: Increase the ring buffer size. - scsi: storvsc: Retrieve information about the capability of the target. - scsi: storvsc: Set the tablesize based on the information given by the host. - scsi: storvsc: Size the queue depth based on the ringbuffer size. - storvsc: fix a bug in storvsc limits. - storvsc: force discovery of LUNs that may have been removed. - storvsc: force SPC-3 compliance on win8 and win8 r2 hosts. - storvsc: in responce to a scan event, scan the host. - take read_seqbegin_or_lock() and friends to seqlock.h (Time scalability). - tcp: prevent fetching dst twice in early demux code (bnc#903997 bnc#919719). - time, signal: Protect resource use statistics with seqlock -kabi (Time scalability). - time, signal: Protect resource use statistics with seqlock (Time scalability). - udp: only allow UFO for packets from SOCK_DGRAM sockets (bnc#909309). - Update Xen patches to 3.12.39. - virtio: rng: add derating factor for use by hwrng core (bsc#918615). - x86, AVX-512: AVX-512 Feature Detection (bsc#921527). - x86, AVX-512: Enable AVX-512 States Context Switch (bsc#921527). - xenbus: add proper handling of XS_ERROR from Xenbus for transactions. - xfs: xfs_alloc_fix_minleft can underflow near ENOSPC (bnc#913080).
Patchnames
SUSE-SLE-DESKTOP-12-2015-152,SUSE-SLE-Live-Patching-12-2015-152,SUSE-SLE-Module-Public-Cloud-12-2015-152,SUSE-SLE-SDK-12-2015-152,SUSE-SLE-SERVER-12-2015-152,SUSE-SLE-WE-12-2015-152
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security Update for Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise Server 12 kernel was updated to 3.12.39 to\nreceive various security and bugfixes.\n\nFollowing security bugs were fixed:\n- CVE-2015-0777: The XEN usb backend could leak information to the guest\n  system due to copying uninitialized memory.\n\n- CVE-2015-2150: Xen and the Linux kernel did not properly restrict access\n  to PCI command registers, which might have allowed local guest users to\n  cause a denial of service (non-maskable interrupt and host crash) by\n  disabling the (1) memory or (2) I/O decoding for a PCI Express device\n  and then accessing the device, which triggers an Unsupported Request\n  (UR) response.\n\nThe following non-security bugs were fixed:\n- Added Little Endian support to vtpm module (bsc#918620).\n- Add support for pnfs block layout. Patches not included by default yet\n- ALSA: hda - Fix regression of HD-audio controller fallback modes (bsc#921313).\n- btrfs: add missing blk_finish_plug in btrfs_sync_log() (bnc#922284).\n- btrfs: cleanup orphans while looking up default subvolume (bsc#914818).\n- btrfs: do not ignore errors from btrfs_lookup_xattr in do_setxattr (bnc#922272).\n- btrfs: fix BUG_ON in btrfs_orphan_add() when delete unused block group (bnc#922278).\n- btrfs: fix data loss in the fast fsync path (bnc#922275).\n- btrfs: fix fsync data loss after adding hard link to inode (bnc#922275).\n- cgroup: revert cgroup_mutex removal from idr_remove (bnc#918644).\n- cifs: fix use-after-free bug in find_writable_file (bnc#909477).\n- crypto: rng - RNGs must return 0 in success case (bsc#920805).\n- crypto: testmgr - fix RNG return code enforcement (bsc#920805).\n- exit: Always reap resource stats in __exit_signal() (Time scalability).\n- fork: report pid reservation failure properly (bnc#909684).\n- fsnotify: Fix handling of renames in audit (bnc#915200).\n- HID: hyperv: match wait_for_completion_timeout return type.\n- hv: address compiler warnings for hv_fcopy_daemon.c.\n- hv: address compiler warnings for hv_kvp_daemon.c.\n- hv: check vmbus_device_create() return value in vmbus_process_offer().\n- hv: do not add redundant / in hv_start_fcopy().\n- hv: hv_balloon: Do not post pressure status from interrupt context.\n- hv: hv_balloon: Fix a locking bug in the balloon driver.\n- hv: hv_balloon: Make adjustments in computing the floor.\n- hv: hv_fcopy: drop the obsolete message on transfer failure.\n- hv: kvp_daemon: make IPv6-only-injection work.\n- hv: remove unused bytes_written from kvp_update_file().\n- hv: rename sc_lock to the more generic lock.\n- hv: vmbus: Fix a bug in vmbus_establish_gpadl().\n- hv: vmbus: hv_process_timer_expiration() can be static.\n- hv: vmbus: Implement a clockevent device.\n- hv: vmbus: serialize Offer and Rescind offer.\n- hv: vmbus: Support a vmbus API for efficiently sending page arrays.\n- hv: vmbus: Use get_cpu() to get the current CPU.\n- hyperv: fix sparse warnings.\n- hyperv: Fix the error processing in netvsc_send().\n- hyperv: match wait_for_completion_timeout return type.\n- hyperv: netvsc.c: match wait_for_completion_timeout return type.\n- iommu/vt-d: Fix dmar_domain leak in iommu_attach_device (bsc#924460).\n- kabi, mm: prevent endless growth of anon_vma hierarchy (bnc#904242).\n- kABI: protect linux/namei.h include in procfs.\n- kABI: protect struct hif_scatter_req.\n- kabi/severities: Stop maintaining the kgraft kabi\n- kernel/sched/clock.c: add another clock for use with the soft lockup watchdog (bsc#919939).\n- kgr: Allow patches to require an exact kernel version (bnc#920615).\n- KVM: PPC: Book3S HV: ptes are big endian (bsc#920839).\n- mm: convert the rest to new page table lock api (the suse-only cases) (fate#315482).\n- mm: fix anon_vma-\u0026gt;degree underflow in anon_vma endless growing prevention (bnc#904242).\n- mm: fix corner case in anon_vma endless growing prevention (bnc#904242).\n- mm: prevent endless growth of anon_vma hierarchy (bnc#904242).\n- mm: prevent endless growth of anon_vma hierarchy  mm: prevent endless growth of anon_vma hierarchy (bnc#904242).\n- mm: vmscan: count only dirty pages as congested (VM Performance, bnc#910517).\n- module: Clean up ro/nx after early module load failures (bsc#921990).\n- module: set nx before marking module MODULE_STATE_COMING (bsc#921990).\n- net: add sysfs helpers for netdev_adjacent logic (bnc#915660).\n- net: correct error path in rtnl_newlink() (bnc#915660).\n- net: fix creation adjacent device symlinks (bnc#915660).\n- net: prevent of emerging cross-namespace symlinks (bnc#915660).\n- net: rename sysfs symlinks on device name change (bnc#915660).\n- nfs: cap request size to fit a kmalloced page array (bnc#898675).\n- nfs: commit layouts in fdatasync (bnc#898675).\n- NFSv4.1: Do not trust attributes if a pNFS LAYOUTCOMMIT is outstanding (bnc#898675).\n- NFSv4.1: Ensure that the layout recall callback matches layout stateids (bnc#898675).\n- NFSv4.1: Ensure that we free existing layout segments if we get a new layout (bnc#898675).\n- NFSv4.1: Fix a race in nfs4_write_inode (bnc#898675).\n- NFSv4.1: Fix wraparound issues in pnfs_seqid_is_newer() (bnc#898675).\n- NFSv4.1: Minor optimisation in get_layout_by_fh_locked() (bnc#898675).\n- NFSv4: Do not update the open stateid unless it is newer than the old one (bnc#898675).\n- pnfs: add a common GETDEVICELIST implementation (bnc#898675).\n- pnfs: add a nfs4_get_deviceid helper (bnc#898675).\n- pnfs: add flag to force read-modify-write in -\u0026gt;write_begin (bnc#898675).\n- pnfs: add return_range method (bnc#898675).\n- pnfs: allow splicing pre-encoded pages into the layoutcommit args (bnc#898675).\n- pnfs: avoid using stale stateids after layoutreturn (bnc#898675).\n- pnfs/blocklayout: allocate separate pages for the layoutcommit payload (bnc#898675).\n- pnfs/blocklayout: correctly decrement extent length (bnc#898675).\n- pnfs/blocklayout: do not set pages uptodate (bnc#898675).\n- pnfs/blocklayout: Fix a 64-bit division/remainder issue in bl_map_stripe (bnc#898675).\n- pnfs/blocklayout: implement the return_range method (bnc#898675).\n- pnfs/blocklayout: improve GETDEVICEINFO error reporting (bnc#898675).\n- pnfs/blocklayout: include vmalloc.h for __vmalloc (bnc#898675).\n- pnfs/blocklayout: in-kernel GETDEVICEINFO XDR parsing (bnc#898675).\n- pnfs/blocklayout: move all rpc_pipefs related code into a single file (bnc#898675).\n- pnfs/blocklayout: move extent processing to blocklayout.c (bnc#898675).\n- pnfs/blocklayout: plug block queues (bnc#898675).\n- pnfs/blocklayout: refactor extent processing (bnc#898675).\n- pnfs/blocklayout: reject pnfs blocksize larger than page size (bnc#898675).\n- pNFS/blocklayout: Remove a couple of unused variables (bnc#898675).\n- pnfs/blocklayout: remove read-modify-write handling in bl_write_pagelist (bnc#898675).\n- pnfs/blocklayout: remove some debugging (bnc#898675).\n- pnfs/blocklayout: return layouts on setattr (bnc#898675).\n- pnfs/blocklayout: rewrite extent tracking (bnc#898675).\n- pnfs/blocklayout: use the device id cache (bnc#898675).\n- pnfs: do not check sequence on new stateids in layoutget (bnc#898675).\n- pnfs: do not pass uninitialized lsegs to -\u0026gt;free_lseg (bnc#898675).\n- pnfs: enable CB_NOTIFY_DEVICEID support (bnc#898675).\n- pnfs: factor GETDEVICEINFO implementations (bnc#898675).\n- pnfs: force a layout commit when encountering busy segments during recall (bnc#898675).\n- pnfs: remove GETDEVICELIST implementation (bnc#898675).\n- pnfs: retry after a bad stateid error from layoutget (bnc#898675).\n- powerpc: add running_clock for powerpc to prevent spurious softlockup warnings (bsc#919939).\n- powerpc/pseries: Fix endian problems with LE migration (bsc#918584).\n- remove cgroup_mutex around deactivate_super because it might be dangerous.\n- rtmutex: Document pi chain walk (mutex scalability).\n- rtmutex: No need to keep task ref for lock owner check (mutex scalability).\n- rtmutex: Simplify rtmutex_slowtrylock() (mutex scalability).\n- rtnetlink: fix a memory leak when -\u0026gt;newlink fails (bnc#915660).\n- sched: Change thread_group_cputime() to use for_each_thread() (Time scalability).\n- sched: replace INIT_COMPLETION with reinit_completion.\n- sched, time: Atomically increment stime \u0026 utime (Time scalability).\n- scsi: storvsc: Always send on the selected outgoing channel.\n- scsi: storvsc: Do not assume that the scatterlist is not chained.\n- scsi: storvsc: Enable clustering.\n- scsi: storvsc: Fix a bug in copy_from_bounce_buffer().\n- scsi: storvsc: Increase the ring buffer size.\n- scsi: storvsc: Retrieve information about the capability of the target.\n- scsi: storvsc: Set the tablesize based on the information given by the host.\n- scsi: storvsc: Size the queue depth based on the ringbuffer size.\n- storvsc: fix a bug in storvsc limits.\n- storvsc: force discovery of LUNs that may have been removed.\n- storvsc: force SPC-3 compliance on win8 and win8 r2 hosts.\n- storvsc: in responce to a scan event, scan the host.\n- take read_seqbegin_or_lock() and friends to seqlock.h (Time scalability).\n- tcp: prevent fetching dst twice in early demux code (bnc#903997 bnc#919719).\n- time, signal: Protect resource use statistics with seqlock -kabi (Time scalability).\n- time, signal: Protect resource use statistics with seqlock (Time scalability).\n- udp: only allow UFO for packets from SOCK_DGRAM sockets (bnc#909309).\n- Update Xen patches to 3.12.39.\n- virtio: rng: add derating factor for use by hwrng core (bsc#918615).\n- x86, AVX-512: AVX-512 Feature Detection (bsc#921527).\n- x86, AVX-512: Enable AVX-512 States Context Switch (bsc#921527).\n- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.\n- xfs: xfs_alloc_fix_minleft can underflow near ENOSPC (bnc#913080).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-DESKTOP-12-2015-152,SUSE-SLE-Live-Patching-12-2015-152,SUSE-SLE-Module-Public-Cloud-12-2015-152,SUSE-SLE-SDK-12-2015-152,SUSE-SLE-SERVER-12-2015-152,SUSE-SLE-WE-12-2015-152",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0658-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2015:0658-1",
        "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150658-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2015:0658-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001326.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 898675",
        "url": "https://bugzilla.suse.com/898675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 903997",
        "url": "https://bugzilla.suse.com/903997"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904242",
        "url": "https://bugzilla.suse.com/904242"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909309",
        "url": "https://bugzilla.suse.com/909309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909477",
        "url": "https://bugzilla.suse.com/909477"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909684",
        "url": "https://bugzilla.suse.com/909684"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 910517",
        "url": "https://bugzilla.suse.com/910517"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 913080",
        "url": "https://bugzilla.suse.com/913080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 914818",
        "url": "https://bugzilla.suse.com/914818"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915200",
        "url": "https://bugzilla.suse.com/915200"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915660",
        "url": "https://bugzilla.suse.com/915660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 917830",
        "url": "https://bugzilla.suse.com/917830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 918584",
        "url": "https://bugzilla.suse.com/918584"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 918615",
        "url": "https://bugzilla.suse.com/918615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 918620",
        "url": "https://bugzilla.suse.com/918620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 918644",
        "url": "https://bugzilla.suse.com/918644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919463",
        "url": "https://bugzilla.suse.com/919463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919719",
        "url": "https://bugzilla.suse.com/919719"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919939",
        "url": "https://bugzilla.suse.com/919939"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 920615",
        "url": "https://bugzilla.suse.com/920615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 920805",
        "url": "https://bugzilla.suse.com/920805"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 920839",
        "url": "https://bugzilla.suse.com/920839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 921313",
        "url": "https://bugzilla.suse.com/921313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 921527",
        "url": "https://bugzilla.suse.com/921527"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 921990",
        "url": "https://bugzilla.suse.com/921990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 922272",
        "url": "https://bugzilla.suse.com/922272"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 922275",
        "url": "https://bugzilla.suse.com/922275"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 922278",
        "url": "https://bugzilla.suse.com/922278"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 922284",
        "url": "https://bugzilla.suse.com/922284"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 924460",
        "url": "https://bugzilla.suse.com/924460"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0777 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0777/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2150 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2150/"
      }
    ],
    "title": "Security Update for Linux Kernel",
    "tracking": {
      "current_release_date": "2015-03-26T17:36:44Z",
      "generator": {
        "date": "2015-03-26T17:36:44Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2015:0658-1",
      "initial_release_date": "2015-03-26T17:36:44Z",
      "revision_history": [
        {
          "date": "2015-03-26T17:36:44Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-3.12.39-47.1.noarch",
                "product": {
                  "name": "kernel-devel-3.12.39-47.1.noarch",
                  "product_id": "kernel-devel-3.12.39-47.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-3.12.39-47.1.noarch",
                "product": {
                  "name": "kernel-macros-3.12.39-47.1.noarch",
                  "product_id": "kernel-macros-3.12.39-47.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.12.39-47.1.noarch",
                "product": {
                  "name": "kernel-source-3.12.39-47.1.noarch",
                  "product_id": "kernel-source-3.12.39-47.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-3.12.39-47.3.noarch",
                "product": {
                  "name": "kernel-docs-3.12.39-47.3.noarch",
                  "product_id": "kernel-docs-3.12.39-47.3.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-obs-build-3.12.39-47.2.ppc64le",
                "product": {
                  "name": "kernel-obs-build-3.12.39-47.2.ppc64le",
                  "product_id": "kernel-obs-build-3.12.39-47.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-3.12.39-47.1.ppc64le",
                "product": {
                  "name": "kernel-default-3.12.39-47.1.ppc64le",
                  "product_id": "kernel-default-3.12.39-47.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.39-47.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-3.12.39-47.1.ppc64le",
                  "product_id": "kernel-default-base-3.12.39-47.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.39-47.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-3.12.39-47.1.ppc64le",
                  "product_id": "kernel-default-devel-3.12.39-47.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.39-47.1.ppc64le",
                "product": {
                  "name": "kernel-syms-3.12.39-47.1.ppc64le",
                  "product_id": "kernel-syms-3.12.39-47.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-obs-build-3.12.39-47.2.s390x",
                "product": {
                  "name": "kernel-obs-build-3.12.39-47.2.s390x",
                  "product_id": "kernel-obs-build-3.12.39-47.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-3.12.39-47.1.s390x",
                "product": {
                  "name": "kernel-default-3.12.39-47.1.s390x",
                  "product_id": "kernel-default-3.12.39-47.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.39-47.1.s390x",
                "product": {
                  "name": "kernel-default-base-3.12.39-47.1.s390x",
                  "product_id": "kernel-default-base-3.12.39-47.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.39-47.1.s390x",
                "product": {
                  "name": "kernel-default-devel-3.12.39-47.1.s390x",
                  "product_id": "kernel-default-devel-3.12.39-47.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-3.12.39-47.1.s390x",
                "product": {
                  "name": "kernel-default-man-3.12.39-47.1.s390x",
                  "product_id": "kernel-default-man-3.12.39-47.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.39-47.1.s390x",
                "product": {
                  "name": "kernel-syms-3.12.39-47.1.s390x",
                  "product_id": "kernel-syms-3.12.39-47.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-default-3.12.39-47.1.x86_64",
                  "product_id": "kernel-default-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-3.12.39-47.1.x86_64",
                  "product_id": "kernel-default-devel-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-3.12.39-47.1.x86_64",
                  "product_id": "kernel-default-extra-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-syms-3.12.39-47.1.x86_64",
                  "product_id": "kernel-syms-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-xen-3.12.39-47.1.x86_64",
                  "product_id": "kernel-xen-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-xen-devel-3.12.39-47.1.x86_64",
                  "product_id": "kernel-xen-devel-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-3_12_39-47-default-1-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-3_12_39-47-default-1-2.1.x86_64",
                  "product_id": "kgraft-patch-3_12_39-47-default-1-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-3_12_39-47-xen-1-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-3_12_39-47-xen-1-2.1.x86_64",
                  "product_id": "kgraft-patch-3_12_39-47-xen-1-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-ec2-3.12.39-47.1.x86_64",
                  "product_id": "kernel-ec2-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-devel-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-ec2-devel-3.12.39-47.1.x86_64",
                  "product_id": "kernel-ec2-devel-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-extra-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-ec2-extra-3.12.39-47.1.x86_64",
                  "product_id": "kernel-ec2-extra-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-3.12.39-47.2.x86_64",
                "product": {
                  "name": "kernel-obs-build-3.12.39-47.2.x86_64",
                  "product_id": "kernel-obs-build-3.12.39-47.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-default-base-3.12.39-47.1.x86_64",
                  "product_id": "kernel-default-base-3.12.39-47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-base-3.12.39-47.1.x86_64",
                "product": {
                  "name": "kernel-xen-base-3.12.39-47.1.x86_64",
                  "product_id": "kernel-xen-base-3.12.39-47.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Desktop 12",
                "product": {
                  "name": "SUSE Linux Enterprise Desktop 12",
                  "product_id": "SUSE Linux Enterprise Desktop 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sled:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12",
                  "product_id": "SUSE Linux Enterprise Live Patching 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 12",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 12",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12",
                  "product_id": "SUSE Linux Enterprise Server 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-devel-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-extra-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-3.12.39-47.1.noarch as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.39-47.1.noarch"
        },
        "product_reference": "kernel-devel-3.12.39-47.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-3.12.39-47.1.noarch as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.39-47.1.noarch"
        },
        "product_reference": "kernel-macros-3.12.39-47.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.12.39-47.1.noarch as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.39-47.1.noarch"
        },
        "product_reference": "kernel-source-3.12.39-47.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-syms-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-xen-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-3_12_39-47-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
          "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-1-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-3_12_39-47-default-1-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-3_12_39-47-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
          "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-1-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-3_12_39-47-xen-1-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-ec2-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-devel-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-ec2-devel-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-extra-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-ec2-extra-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-3.12.39-47.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.39-47.3.noarch"
        },
        "product_reference": "kernel-docs-3.12.39-47.3.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-3.12.39-47.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.ppc64le"
        },
        "product_reference": "kernel-obs-build-3.12.39-47.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-3.12.39-47.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.s390x"
        },
        "product_reference": "kernel-obs-build-3.12.39-47.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-3.12.39-47.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.x86_64"
        },
        "product_reference": "kernel-obs-build-3.12.39-47.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.39-47.1.ppc64le as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.ppc64le"
        },
        "product_reference": "kernel-default-3.12.39-47.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-default-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.39-47.1.ppc64le as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.ppc64le"
        },
        "product_reference": "kernel-default-base-3.12.39-47.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-default-base-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-base-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.39-47.1.ppc64le as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-3.12.39-47.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-default-devel-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-devel-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-default-man-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-3.12.39-47.1.noarch as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.39-47.1.noarch"
        },
        "product_reference": "kernel-devel-3.12.39-47.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-3.12.39-47.1.noarch as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.39-47.1.noarch"
        },
        "product_reference": "kernel-macros-3.12.39-47.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.12.39-47.1.noarch as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.39-47.1.noarch"
        },
        "product_reference": "kernel-source-3.12.39-47.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.39-47.1.ppc64le as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.ppc64le"
        },
        "product_reference": "kernel-syms-3.12.39-47.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-syms-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-syms-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-xen-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-xen-base-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.39-47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.ppc64le"
        },
        "product_reference": "kernel-default-3.12.39-47.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-default-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.39-47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.ppc64le"
        },
        "product_reference": "kernel-default-base-3.12.39-47.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-default-base-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-base-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.39-47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-3.12.39-47.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-default-devel-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-devel-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-default-man-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-3.12.39-47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.39-47.1.noarch"
        },
        "product_reference": "kernel-devel-3.12.39-47.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-3.12.39-47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.39-47.1.noarch"
        },
        "product_reference": "kernel-macros-3.12.39-47.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.12.39-47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.39-47.1.noarch"
        },
        "product_reference": "kernel-source-3.12.39-47.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.39-47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.ppc64le"
        },
        "product_reference": "kernel-syms-3.12.39-47.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.39-47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.s390x"
        },
        "product_reference": "kernel-syms-3.12.39-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-syms-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-xen-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-xen-base-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-3.12.39-47.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.39-47.1.x86_64"
        },
        "product_reference": "kernel-default-extra-3.12.39-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-0777",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0777"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-1-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-1-2.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-devel-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server 12:kernel-macros-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server 12:kernel-source-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-xen-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.39-47.3.noarch",
          "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.s390x",
          "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.39-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0777",
          "url": "https://www.suse.com/security/cve/CVE-2015-0777"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 917830 for CVE-2015-0777",
          "url": "https://bugzilla.suse.com/917830"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-1-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-1-2.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-devel-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server 12:kernel-macros-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server 12:kernel-source-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-xen-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.39-47.3.noarch",
            "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.s390x",
            "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.39-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-03-26T17:36:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-0777"
    },
    {
      "cve": "CVE-2015-2150",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2150"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-1-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-1-2.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-devel-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server 12:kernel-macros-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server 12:kernel-source-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-xen-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.39-47.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.39-47.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.39-47.3.noarch",
          "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.s390x",
          "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.39-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2150",
          "url": "https://www.suse.com/security/cve/CVE-2015-2150"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 800280 for CVE-2015-2150",
          "url": "https://bugzilla.suse.com/800280"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903967 for CVE-2015-2150",
          "url": "https://bugzilla.suse.com/903967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 919463 for CVE-2015-2150",
          "url": "https://bugzilla.suse.com/919463"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-default-1-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_39-47-xen-1-2.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-default-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-devel-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server 12:kernel-macros-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server 12:kernel-source-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server 12:kernel-syms-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-xen-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.39-47.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.39-47.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.39-47.3.noarch",
            "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.s390x",
            "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.39-47.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.39-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-03-26T17:36:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2150"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…