suse-su-2015:2292-1
Vulnerability from csaf_suse
Published
2015-12-17 12:08
Modified
2015-12-17 12:08
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.51 to receive
various security and bugfixes.
Following features were added:
- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).
Following security bugs were fixed:
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
kernel did not validate attempted changes to the MTU value, which allowed
context-dependent attackers to cause a denial of service (packet loss)
via a value that is (1) smaller than the minimum compliant value or
(2) larger than the MTU of an interface, as demonstrated by a Router
Advertisement (RA) message that is not validated by a daemon, a different
vulnerability than CVE-2015-0272. (bsc#955354)
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c in
the Linux kernel attempted to support a FRAGLIST feature without proper
memory allocation, which allowed guest OS users to cause a denial of
service (buffer overflow and memory corruption) via a crafted sequence
of fragmented packets (bnc#940776).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
in the Linux kernel allowed local users to cause a denial of service
(OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
the Linux kernel did not ensure that certain slot numbers are valid,
which allowed local users to cause a denial of service (NULL
pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl
call (bnc#949936).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
kernel did not properly handle rename actions inside a bind mount, which
allowed local users to bypass an intended container protection mechanism
by renaming a directory, related to a 'double-chroot attack (bnc#926238).
- CVE-2015-7990: RDS: Verify the underlying transport exists before
creating a connection, preventing possible DoS (bsc#952384).
The following non-security bugs were fixed:
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#954986, LTC#131684).
- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).
- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).
- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).
- audit: correctly record file names with different path name types (bsc#950013).
- audit: create private file name copies when auditing inodes (bsc#950013).
- bcache: Add btree_insert_node() (bnc#951638).
- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).
- bcache: backing device set to clean after finishing detach (bsc#951638).
- bcache: backing device set to clean after finishing detach (bsc#951638).
- bcache: Clean up keylist code (bnc#951638).
- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).
- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).
- bcache: Explicitly track btree node's parent (bnc#951638).
- bcache: Fix a bug when detaching (bsc#951638).
- bcache: Fix a lockdep splat in an error path (bnc#951638).
- bcache: Fix a shutdown bug (bsc#951638).
- bcache: Fix more early shutdown bugs (bsc#951638).
- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- bcache: Insert multiple keys at a time (bnc#951638).
- bcache: kill closure locking usage (bnc#951638).
- bcache: Refactor journalling flow control (bnc#951638).
- bcache: Refactor request_write() (bnc#951638).
- bcache: Use blkdev_issue_discard() (bnc#951638).
- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).
- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).
- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).
- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).
- btrfs: fix condition of commit transaction (bsc#958647).
- btrfs: fix condition of commit transaction (bsc#958647).
- btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053).
- btrfs: Fix out-of-space bug (bsc#958647).
- btrfs: Fix out-of-space bug (bsc#958647).
- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).
- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).
- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).
- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).
- btrfs: fix truncation of compressed and inlined extents (bnc#956053).
- btrfs: Set relative data on clear btrfs_block_group_cache->pinned (bsc#958647).
- btrfs: Set relative data on clear btrfs_block_group_cache->pinned (bsc#958647).
- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).
- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).
- cache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#957395).
- cxgb4i: Increased the value of MAX_IMM_TX_PKT_LEN from 128 to 256 bytes (bsc#950580).
- dlm: make posix locks interruptible, (bsc#947241).
- dmapi: Fix xfs dmapi to not unlock & lock XFS_ILOCK_EXCL (bsc#949744).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dm-snap: avoid deadock on s->lock when a read is split (bsc#939826).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- drm: Allocate new master object when client becomes master (bsc#956876, bsc#956801).
- drm: Fix KABI of 'struct drm_file' (bsc#956876, bsc#956801).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: clean up backlight conditional build (bsc#941113).
- drm/i915: debug print on backlight register (bsc#941113).
- drm/i915: do full backlight setup at enable time (bsc#941113).
- drm/i915: do not save/restore backlight registers in KMS (bsc#941113).
- drm/i915: Eliminate lots of WARNs when there's no backlight present (bsc#941113).
- drm/i915: fix gen2-gen3 backlight set (bsc#941113,bsc#953971).
- drm/i915: Fix gen3 self-refresh watermarks (bsc#953830,bsc#953971).
- drm/i915: Fix missing backlight update during panel disablement (bsc#941113).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- drm/i915: gather backlight information at setup (bsc#941113).
- drm/i915: handle backlight through chip specific functions (bsc#941113).
- drm/i915: Ignore 'digital output' and 'not HDMI output' bits for eDP detection (bsc#949192).
- drm/i915: make asle notifications update backlight on all connectors (bsc#941113).
- drm/i915: make backlight info per-connector (bsc#941113).
- drm/i915: move backlight level setting in enable/disable to hooks (bsc#941113).
- drm/i915: move opregion asle request handling to a work queue (bsc#953826).
- drm/i915: nuke get max backlight functions (bsc#941113).
- drm/i915/opregion: fix build error on CONFIG_ACPI=n (bsc#953826).
- drm/i915: restore backlight precision when converting from ACPI (bsc#941113).
- drm/i915/tv: add ->get_config callback (bsc#953830).
- drm/i915: use backlight legacy combination mode also for i915gm/i945gm (bsc#941113).
- drm/i915: use the initialized backlight max value instead of reading it (bsc#941113).
- drm/i915: vlv does not have pipe field in backlight registers (bsc#941113).
- fanotify: fix notification of groups with inode & mount marks (bsc#955533).
- Fix remove_and_add_spares removes drive added as spare in slot_store (bsc#956717).
- genksyms: Handle string literals with spaces in reference files (bsc#958510).
- genksyms: Handle string literals with spaces in reference files (bsc#958510).
- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).
in the non-RT kernel to minimize the differences.
- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).
- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).
- ixgbe: fix broken PFC with X550 (bsc#951864).
- ixgbe: use correct fcoe ddp max check (bsc#951864).
- kabi: Fix spurious kabi change in mm/util.c.
- kABI: protect struct ahci_host_priv.
- kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635).
- kabi: Restore kabi in struct se_cmd (bsc#954635).
- kabi: Restore kabi in struct se_subsystem_api (bsc#954635).
- ktime: add ktime_after and ktime_before helper (bsc#904348).
- mm: factor commit limit calculation (VM Performance).
- mm: get rid of 'vmalloc_info' from /proc/meminfo (VM Performance).
- mm: hugetlbfs: skip shared VMAs when unmapping private pages to satisfy a fault (Automatic NUMA Balancing (fate#315482)).
- mm: remove PG_waiters from PAGE_FLAGS_CHECK_AT_FREE (bnc#943959).
- mm: vmscan: never isolate more pages than necessary (VM Performance).
- Move ktime_after patch to the networking section
- nfsrdma: Fix regression in NFSRDMA server (bsc#951110).
- pci: Drop 'setting latency timer' messages (bsc#956047).
- pci: Update VPD size with correct length (bsc#924493).
- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).
- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).
- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).
- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).
- pm, hinernate: use put_page in release_swap_writer (bnc#943959).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- Re-add copy_page_vector_to_user()
- ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711).
- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).
- rpm/constraints.in: Require 14GB worth of disk space on POWER The builds started to fail randomly due to ENOSPC errors.
- rpm/kernel-binary.spec.in: Always build zImage for ARM
- rpm/kernel-binary.spec.in: Do not explicitly set DEBUG_SECTION_MISMATCH CONFIG_DEBUG_SECTION_MISMATCH is a selectable Kconfig option since 2.6.39 and is enabled in our configs.
- rpm/kernel-binary.spec.in: Drop the %build_src_dir macro It is the parent directory of the O= directory.
- rpm/kernel-binary.spec.in: really pass down %{?_smp_mflags}
- rpm/kernel-binary.spec.in: Use parallel make in all invocations Also, remove the lengthy comment, since we are using a standard rpm macro now.
- rpm/kernel-binary.spec.in: Use upstream script to support config.addon
- s390/dasd: fix disconnected device with valid path mask (bnc#954986, LTC#132707).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#954986, LTC#132706).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954986, LTC#133077).
- sched: Call select_idle_sibling() when not affine_sd (Scheduler Performance).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#957395).
- sched/numa: Check all nodes when placing a pseudo-interleaved group (Automatic NUMA Balancing (fate#315482)).
- sched/numa: Fix math underflow in task_tick_numa() (Automatic NUMA Balancing (fate#315482)).
- sched/numa: Only consider less busy nodes as numa balancing destinations (Automatic NUMA Balancing (fate#315482)).
- sched: Put expensive runtime debugging checks under a separate Kconfig entry (Scheduler performance).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- sunrpc/cache: make cache flushing more reliable (bsc#947478).
- sunrpc: Fix oops when trace sunrpc_task events in nfs client (bnc#956703).
- supported.conf: Support peak_pci and sja1000: These 2 CAN drivers are
supported in the RT kernel for a long time so we can also support them
- target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666).
- target: Send UA upon LUN RESET tmr completion (bsc#933514).
- target: use 'se_dev_entry' when allocating UAs (bsc#933514).
- Update config files. (bnc#955644)
- Update kabi files with sbc_parse_cdb symbol change (bsc#954635).
- usbvision fix overflow of interfaces array (bnc#950998).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- x86/efi: Fix invalid parameter error when getting hibernation key (fate#316350, bsc#956284).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86/mm: Add parenthesis for TLB tracepoint size calculation (VM Performance (Reduce IPIs during reclaim)).
- x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148).
- x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148).
- x86/tsc: Let high latency PIT fail fast in quick_pit_calibrate() (bsc#953717).
- xen: fix boot crash in EC2 settings (bsc#956147).
- xen: refresh patches.xen/xen-x86_64-m2p-strict (bsc#956147).
- xen: Update Xen patches to 3.12.50.
- xfs: always drain dio before extending aio write submission (bsc#949744).
- xfs: DIO needs an ioend for writes (bsc#949744).
- xfs: DIO write completion size updates race (bsc#949744).
- xfs: DIO writes within EOF do not need an ioend (bsc#949744).
- xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744).
- xfs: do not allocate an ioend for direct I/O completions (bsc#949744).
- xfs: factor DIO write mapping from get_blocks (bsc#949744).
- xfs: handle DIO overwrite EOF update completion correctly (bsc#949744).
- xfs: move DIO mapping size calculation (bsc#949744).
- xfs: using generic_file_direct_write() is unnecessary (bsc#949744).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165).
- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#957546).
- zfcp: fix fc_host port_type with NPIV (bnc#954986, LTC#132479).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2015-985,SUSE-SLE-Live-Patching-12-2015-985,SUSE-SLE-Module-Public-Cloud-12-2015-985,SUSE-SLE-SDK-12-SP1-2015-985,SUSE-SLE-SERVER-12-SP1-2015-985,SUSE-SLE-WE-12-SP1-2015-985
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.51 to receive\nvarious security and bugfixes.\n\nFollowing features were added:\n- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).\n\nFollowing security bugs were fixed:\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux\n kernel did not validate attempted changes to the MTU value, which allowed\n context-dependent attackers to cause a denial of service (packet loss)\n via a value that is (1) smaller than the minimum compliant value or\n (2) larger than the MTU of an interface, as demonstrated by a Router\n Advertisement (RA) message that is not validated by a daemon, a different\n vulnerability than CVE-2015-0272. (bsc#955354)\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c in\n the Linux kernel attempted to support a FRAGLIST feature without proper\n memory allocation, which allowed guest OS users to cause a denial of\n service (buffer overflow and memory corruption) via a crafted sequence\n of fragmented packets (bnc#940776).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c\n in the Linux kernel allowed local users to cause a denial of service\n (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in\n the Linux kernel did not ensure that certain slot numbers are valid,\n which allowed local users to cause a denial of service (NULL\n pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl\n call (bnc#949936).\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n kernel did not properly handle rename actions inside a bind mount, which\n allowed local users to bypass an intended container protection mechanism\n by renaming a directory, related to a \u0027double-chroot attack (bnc#926238).\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n creating a connection, preventing possible DoS (bsc#952384).\n\nThe following non-security bugs were fixed:\n- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#954986, LTC#131684).\n- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).\n- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).\n- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).\n- audit: correctly record file names with different path name types (bsc#950013).\n- audit: create private file name copies when auditing inodes (bsc#950013).\n- bcache: Add btree_insert_node() (bnc#951638).\n- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).\n- bcache: backing device set to clean after finishing detach (bsc#951638).\n- bcache: backing device set to clean after finishing detach (bsc#951638).\n- bcache: Clean up keylist code (bnc#951638).\n- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).\n- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).\n- bcache: Explicitly track btree node\u0027s parent (bnc#951638).\n- bcache: Fix a bug when detaching (bsc#951638).\n- bcache: Fix a lockdep splat in an error path (bnc#951638).\n- bcache: Fix a shutdown bug (bsc#951638).\n- bcache: Fix more early shutdown bugs (bsc#951638).\n- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- bcache: Insert multiple keys at a time (bnc#951638).\n- bcache: kill closure locking usage (bnc#951638).\n- bcache: Refactor journalling flow control (bnc#951638).\n- bcache: Refactor request_write() (bnc#951638).\n- bcache: Use blkdev_issue_discard() (bnc#951638).\n- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).\n- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).\n- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).\n- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).\n- btrfs: fix condition of commit transaction (bsc#958647).\n- btrfs: fix condition of commit transaction (bsc#958647).\n- btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053).\n- btrfs: Fix out-of-space bug (bsc#958647).\n- btrfs: Fix out-of-space bug (bsc#958647).\n- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).\n- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).\n- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).\n- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).\n- btrfs: fix truncation of compressed and inlined extents (bnc#956053).\n- btrfs: Set relative data on clear btrfs_block_group_cache-\u0026gt;pinned (bsc#958647).\n- btrfs: Set relative data on clear btrfs_block_group_cache-\u003epinned (bsc#958647).\n- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).\n- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).\n- cache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773).\n- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#957395).\n- cxgb4i: Increased the value of MAX_IMM_TX_PKT_LEN from 128 to 256 bytes (bsc#950580).\n- dlm: make posix locks interruptible, (bsc#947241).\n- dmapi: Fix xfs dmapi to not unlock \u0026 lock XFS_ILOCK_EXCL (bsc#949744).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- dm-snap: avoid deadock on s-\u0026gt;lock when a read is split (bsc#939826).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- drm: Allocate new master object when client becomes master (bsc#956876, bsc#956801).\n- drm: Fix KABI of \u0027struct drm_file\u0027 (bsc#956876, bsc#956801).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- drm/i915: clean up backlight conditional build (bsc#941113).\n- drm/i915: debug print on backlight register (bsc#941113).\n- drm/i915: do full backlight setup at enable time (bsc#941113).\n- drm/i915: do not save/restore backlight registers in KMS (bsc#941113).\n- drm/i915: Eliminate lots of WARNs when there\u0027s no backlight present (bsc#941113).\n- drm/i915: fix gen2-gen3 backlight set (bsc#941113,bsc#953971).\n- drm/i915: Fix gen3 self-refresh watermarks (bsc#953830,bsc#953971).\n- drm/i915: Fix missing backlight update during panel disablement (bsc#941113).\n- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).\n- drm/i915: gather backlight information at setup (bsc#941113).\n- drm/i915: handle backlight through chip specific functions (bsc#941113).\n- drm/i915: Ignore \u0027digital output\u0027 and \u0027not HDMI output\u0027 bits for eDP detection (bsc#949192).\n- drm/i915: make asle notifications update backlight on all connectors (bsc#941113).\n- drm/i915: make backlight info per-connector (bsc#941113).\n- drm/i915: move backlight level setting in enable/disable to hooks (bsc#941113).\n- drm/i915: move opregion asle request handling to a work queue (bsc#953826).\n- drm/i915: nuke get max backlight functions (bsc#941113).\n- drm/i915/opregion: fix build error on CONFIG_ACPI=n (bsc#953826).\n- drm/i915: restore backlight precision when converting from ACPI (bsc#941113).\n- drm/i915/tv: add -\u0026gt;get_config callback (bsc#953830).\n- drm/i915: use backlight legacy combination mode also for i915gm/i945gm (bsc#941113).\n- drm/i915: use the initialized backlight max value instead of reading it (bsc#941113).\n- drm/i915: vlv does not have pipe field in backlight registers (bsc#941113).\n- fanotify: fix notification of groups with inode \u0026 mount marks (bsc#955533).\n- Fix remove_and_add_spares removes drive added as spare in slot_store (bsc#956717).\n- genksyms: Handle string literals with spaces in reference files (bsc#958510).\n- genksyms: Handle string literals with spaces in reference files (bsc#958510).\n- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).\n in the non-RT kernel to minimize the differences.\n- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).\n- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).\n- ixgbe: fix broken PFC with X550 (bsc#951864).\n- ixgbe: use correct fcoe ddp max check (bsc#951864).\n- kabi: Fix spurious kabi change in mm/util.c.\n- kABI: protect struct ahci_host_priv.\n- kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635).\n- kabi: Restore kabi in struct se_cmd (bsc#954635).\n- kabi: Restore kabi in struct se_subsystem_api (bsc#954635).\n- ktime: add ktime_after and ktime_before helper (bsc#904348).\n- mm: factor commit limit calculation (VM Performance).\n- mm: get rid of \u0027vmalloc_info\u0027 from /proc/meminfo (VM Performance).\n- mm: hugetlbfs: skip shared VMAs when unmapping private pages to satisfy a fault (Automatic NUMA Balancing (fate#315482)).\n- mm: remove PG_waiters from PAGE_FLAGS_CHECK_AT_FREE (bnc#943959).\n- mm: vmscan: never isolate more pages than necessary (VM Performance).\n- Move ktime_after patch to the networking section\n- nfsrdma: Fix regression in NFSRDMA server (bsc#951110).\n- pci: Drop \u0027setting latency timer\u0027 messages (bsc#956047).\n- pci: Update VPD size with correct length (bsc#924493).\n- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).\n- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).\n- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).\n- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).\n- pm, hinernate: use put_page in release_swap_writer (bnc#943959).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- Re-add copy_page_vector_to_user()\n- ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711).\n- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).\n- rpm/constraints.in: Require 14GB worth of disk space on POWER The builds started to fail randomly due to ENOSPC errors.\n- rpm/kernel-binary.spec.in: Always build zImage for ARM\n- rpm/kernel-binary.spec.in: Do not explicitly set DEBUG_SECTION_MISMATCH CONFIG_DEBUG_SECTION_MISMATCH is a selectable Kconfig option since 2.6.39 and is enabled in our configs.\n- rpm/kernel-binary.spec.in: Drop the %build_src_dir macro It is the parent directory of the O= directory.\n- rpm/kernel-binary.spec.in: really pass down %{?_smp_mflags}\n- rpm/kernel-binary.spec.in: Use parallel make in all invocations Also, remove the lengthy comment, since we are using a standard rpm macro now.\n- rpm/kernel-binary.spec.in: Use upstream script to support config.addon\n- s390/dasd: fix disconnected device with valid path mask (bnc#954986, LTC#132707).\n- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#954986, LTC#132706).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954986, LTC#133077).\n- sched: Call select_idle_sibling() when not affine_sd (Scheduler Performance).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#957395).\n- sched/numa: Check all nodes when placing a pseudo-interleaved group (Automatic NUMA Balancing (fate#315482)).\n- sched/numa: Fix math underflow in task_tick_numa() (Automatic NUMA Balancing (fate#315482)).\n- sched/numa: Only consider less busy nodes as numa balancing destinations (Automatic NUMA Balancing (fate#315482)).\n- sched: Put expensive runtime debugging checks under a separate Kconfig entry (Scheduler performance).\n- scsi: hosts: update to use ida_simple for host_no (bsc#939926)\n- sunrpc/cache: make cache flushing more reliable (bsc#947478).\n- sunrpc: Fix oops when trace sunrpc_task events in nfs client (bnc#956703).\n- supported.conf: Support peak_pci and sja1000: These 2 CAN drivers are\n supported in the RT kernel for a long time so we can also support them\n- target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666).\n- target: Send UA upon LUN RESET tmr completion (bsc#933514).\n- target: use \u0027se_dev_entry\u0027 when allocating UAs (bsc#933514).\n- Update config files. (bnc#955644)\n- Update kabi files with sbc_parse_cdb symbol change (bsc#954635).\n- usbvision fix overflow of interfaces array (bnc#950998).\n- vmxnet3: adjust ring sizes when interface is down (bsc#950750).\n- vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).\n- x86/efi: Fix invalid parameter error when getting hibernation key (fate#316350, bsc#956284).\n- x86/evtchn: make use of PHYSDEVOP_map_pirq.\n- x86/mm: Add parenthesis for TLB tracepoint size calculation (VM Performance (Reduce IPIs during reclaim)).\n- x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148).\n- x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148).\n- x86/tsc: Let high latency PIT fail fast in quick_pit_calibrate() (bsc#953717).\n- xen: fix boot crash in EC2 settings (bsc#956147).\n- xen: refresh patches.xen/xen-x86_64-m2p-strict (bsc#956147).\n- xen: Update Xen patches to 3.12.50.\n- xfs: always drain dio before extending aio write submission (bsc#949744).\n- xfs: DIO needs an ioend for writes (bsc#949744).\n- xfs: DIO write completion size updates race (bsc#949744).\n- xfs: DIO writes within EOF do not need an ioend (bsc#949744).\n- xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744).\n- xfs: do not allocate an ioend for direct I/O completions (bsc#949744).\n- xfs: factor DIO write mapping from get_blocks (bsc#949744).\n- xfs: handle DIO overwrite EOF update completion correctly (bsc#949744).\n- xfs: move DIO mapping size calculation (bsc#949744).\n- xfs: using generic_file_direct_write() is unnecessary (bsc#949744).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165).\n- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#957546).\n- zfcp: fix fc_host port_type with NPIV (bnc#954986, LTC#132479).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2015-985,SUSE-SLE-Live-Patching-12-2015-985,SUSE-SLE-Module-Public-Cloud-12-2015-985,SUSE-SLE-SDK-12-SP1-2015-985,SUSE-SLE-SERVER-12-SP1-2015-985,SUSE-SLE-WE-12-SP1-2015-985", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2292-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:2292-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152292-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:2292-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html" }, { "category": "self", "summary": "SUSE Bug 758040", "url": "https://bugzilla.suse.com/758040" }, { "category": "self", "summary": "SUSE Bug 814440", "url": "https://bugzilla.suse.com/814440" }, { "category": "self", "summary": "SUSE Bug 904348", "url": "https://bugzilla.suse.com/904348" }, { "category": "self", "summary": "SUSE Bug 921949", "url": "https://bugzilla.suse.com/921949" }, { "category": "self", "summary": "SUSE Bug 924493", "url": "https://bugzilla.suse.com/924493" }, { "category": "self", "summary": "SUSE Bug 926238", "url": "https://bugzilla.suse.com/926238" }, { "category": "self", "summary": "SUSE Bug 933514", "url": "https://bugzilla.suse.com/933514" }, { "category": "self", "summary": "SUSE Bug 936773", "url": "https://bugzilla.suse.com/936773" }, { "category": "self", "summary": "SUSE Bug 939826", "url": "https://bugzilla.suse.com/939826" }, { "category": "self", "summary": "SUSE Bug 939926", "url": "https://bugzilla.suse.com/939926" }, { "category": "self", "summary": "SUSE Bug 940776", "url": "https://bugzilla.suse.com/940776" }, { "category": "self", "summary": "SUSE Bug 941113", "url": "https://bugzilla.suse.com/941113" }, { "category": "self", "summary": "SUSE Bug 941202", "url": "https://bugzilla.suse.com/941202" }, { "category": "self", "summary": "SUSE Bug 943959", "url": "https://bugzilla.suse.com/943959" }, { "category": "self", "summary": "SUSE Bug 944296", "url": "https://bugzilla.suse.com/944296" }, { "category": "self", "summary": "SUSE Bug 947241", "url": "https://bugzilla.suse.com/947241" }, { "category": "self", "summary": "SUSE Bug 947478", "url": "https://bugzilla.suse.com/947478" }, { "category": "self", "summary": "SUSE Bug 949100", "url": "https://bugzilla.suse.com/949100" }, { "category": "self", "summary": "SUSE Bug 949192", "url": "https://bugzilla.suse.com/949192" }, { "category": "self", "summary": "SUSE Bug 949706", "url": "https://bugzilla.suse.com/949706" }, { "category": "self", "summary": "SUSE Bug 949744", "url": "https://bugzilla.suse.com/949744" }, { "category": "self", "summary": "SUSE Bug 949936", "url": "https://bugzilla.suse.com/949936" }, { "category": "self", "summary": "SUSE Bug 950013", "url": "https://bugzilla.suse.com/950013" }, { "category": "self", "summary": "SUSE Bug 950580", "url": "https://bugzilla.suse.com/950580" }, { "category": "self", "summary": "SUSE Bug 950750", "url": "https://bugzilla.suse.com/950750" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951110", "url": "https://bugzilla.suse.com/951110" }, { "category": "self", "summary": "SUSE Bug 951165", "url": "https://bugzilla.suse.com/951165" }, { "category": "self", "summary": "SUSE Bug 951440", "url": "https://bugzilla.suse.com/951440" }, { "category": "self", "summary": "SUSE Bug 951638", "url": "https://bugzilla.suse.com/951638" }, { "category": "self", "summary": "SUSE Bug 951864", "url": "https://bugzilla.suse.com/951864" }, { "category": "self", "summary": "SUSE Bug 952384", "url": "https://bugzilla.suse.com/952384" }, { "category": "self", "summary": "SUSE Bug 952666", "url": "https://bugzilla.suse.com/952666" }, { "category": "self", "summary": "SUSE Bug 953717", "url": "https://bugzilla.suse.com/953717" }, { "category": "self", "summary": "SUSE Bug 953826", "url": "https://bugzilla.suse.com/953826" }, { "category": "self", "summary": "SUSE Bug 953830", "url": "https://bugzilla.suse.com/953830" }, { "category": "self", "summary": "SUSE Bug 953971", "url": "https://bugzilla.suse.com/953971" }, { "category": "self", "summary": "SUSE Bug 953980", "url": "https://bugzilla.suse.com/953980" }, { "category": "self", "summary": "SUSE Bug 954635", "url": "https://bugzilla.suse.com/954635" }, { "category": "self", "summary": "SUSE Bug 954986", "url": "https://bugzilla.suse.com/954986" }, { "category": "self", "summary": "SUSE Bug 955136", "url": "https://bugzilla.suse.com/955136" }, { "category": "self", "summary": "SUSE Bug 955148", "url": "https://bugzilla.suse.com/955148" }, { "category": "self", "summary": "SUSE Bug 955224", "url": "https://bugzilla.suse.com/955224" }, { "category": "self", "summary": "SUSE Bug 955354", "url": "https://bugzilla.suse.com/955354" }, { "category": "self", "summary": "SUSE Bug 955422", "url": "https://bugzilla.suse.com/955422" }, { "category": "self", "summary": "SUSE Bug 955533", "url": "https://bugzilla.suse.com/955533" }, { "category": "self", "summary": "SUSE Bug 955644", "url": "https://bugzilla.suse.com/955644" }, { "category": "self", "summary": "SUSE Bug 956047", "url": "https://bugzilla.suse.com/956047" }, { "category": "self", "summary": "SUSE Bug 956053", "url": "https://bugzilla.suse.com/956053" }, { "category": "self", "summary": "SUSE Bug 956147", "url": "https://bugzilla.suse.com/956147" }, { "category": "self", "summary": "SUSE Bug 956284", "url": "https://bugzilla.suse.com/956284" }, { "category": "self", "summary": "SUSE Bug 956703", "url": "https://bugzilla.suse.com/956703" }, { "category": "self", "summary": "SUSE Bug 956711", "url": "https://bugzilla.suse.com/956711" }, { "category": "self", "summary": "SUSE Bug 956717", "url": "https://bugzilla.suse.com/956717" }, { "category": "self", "summary": "SUSE Bug 956801", "url": "https://bugzilla.suse.com/956801" }, { "category": "self", "summary": "SUSE Bug 956876", "url": "https://bugzilla.suse.com/956876" }, { "category": "self", "summary": "SUSE Bug 957395", "url": "https://bugzilla.suse.com/957395" }, { "category": "self", "summary": "SUSE Bug 957546", "url": "https://bugzilla.suse.com/957546" }, { "category": "self", "summary": "SUSE Bug 958504", "url": "https://bugzilla.suse.com/958504" }, { "category": "self", "summary": "SUSE Bug 958510", "url": "https://bugzilla.suse.com/958510" }, { "category": "self", "summary": "SUSE Bug 958647", "url": "https://bugzilla.suse.com/958647" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0272 page", "url": "https://www.suse.com/security/cve/CVE-2015-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2925 page", "url": "https://www.suse.com/security/cve/CVE-2015-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5156 page", "url": "https://www.suse.com/security/cve/CVE-2015-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7799 page", "url": "https://www.suse.com/security/cve/CVE-2015-7799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7872 page", "url": "https://www.suse.com/security/cve/CVE-2015-7872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7990 page", "url": "https://www.suse.com/security/cve/CVE-2015-7990/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8215 page", "url": "https://www.suse.com/security/cve/CVE-2015-8215/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-12-17T12:08:13Z", "generator": { "date": "2015-12-17T12:08:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:2292-1", "initial_release_date": "2015-12-17T12:08:13Z", "revision_history": [ { "date": "2015-12-17T12:08:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.51-60.20.2.noarch", "product": { "name": "kernel-devel-3.12.51-60.20.2.noarch", "product_id": "kernel-devel-3.12.51-60.20.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.51-60.20.2.noarch", "product": { "name": "kernel-macros-3.12.51-60.20.2.noarch", "product_id": "kernel-macros-3.12.51-60.20.2.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.51-60.20.2.noarch", "product": { "name": "kernel-source-3.12.51-60.20.2.noarch", "product_id": "kernel-source-3.12.51-60.20.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.51-60.20.2.noarch", "product": { "name": "kernel-docs-3.12.51-60.20.2.noarch", "product_id": "kernel-docs-3.12.51-60.20.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.51-60.20.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.51-60.20.1.ppc64le", "product_id": "kernel-obs-build-3.12.51-60.20.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.51-60.20.2.ppc64le", "product": { "name": "kernel-default-3.12.51-60.20.2.ppc64le", "product_id": "kernel-default-3.12.51-60.20.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.51-60.20.2.ppc64le", "product": { "name": "kernel-default-base-3.12.51-60.20.2.ppc64le", "product_id": "kernel-default-base-3.12.51-60.20.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le", "product": { "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le", "product_id": "kernel-default-devel-3.12.51-60.20.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.51-60.20.2.ppc64le", "product": { "name": "kernel-syms-3.12.51-60.20.2.ppc64le", "product_id": "kernel-syms-3.12.51-60.20.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.51-60.20.1.s390x", "product": { "name": "kernel-obs-build-3.12.51-60.20.1.s390x", "product_id": "kernel-obs-build-3.12.51-60.20.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.51-60.20.2.s390x", "product": { "name": "kernel-default-3.12.51-60.20.2.s390x", "product_id": "kernel-default-3.12.51-60.20.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.51-60.20.2.s390x", "product": { "name": "kernel-default-base-3.12.51-60.20.2.s390x", "product_id": "kernel-default-base-3.12.51-60.20.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.51-60.20.2.s390x", "product": { "name": "kernel-default-devel-3.12.51-60.20.2.s390x", "product_id": "kernel-default-devel-3.12.51-60.20.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.51-60.20.2.s390x", "product": { "name": "kernel-default-man-3.12.51-60.20.2.s390x", "product_id": "kernel-default-man-3.12.51-60.20.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.51-60.20.2.s390x", "product": { "name": "kernel-syms-3.12.51-60.20.2.s390x", "product_id": "kernel-syms-3.12.51-60.20.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-default-3.12.51-60.20.2.x86_64", "product_id": "kernel-default-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-default-devel-3.12.51-60.20.2.x86_64", "product_id": "kernel-default-devel-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-default-extra-3.12.51-60.20.2.x86_64", "product_id": "kernel-default-extra-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-syms-3.12.51-60.20.2.x86_64", "product_id": "kernel-syms-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-xen-3.12.51-60.20.2.x86_64", "product_id": "kernel-xen-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "product_id": "kernel-xen-devel-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-ec2-3.12.51-60.20.2.x86_64", "product_id": "kernel-ec2-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-ec2-devel-3.12.51-60.20.2.x86_64", "product_id": "kernel-ec2-devel-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-ec2-extra-3.12.51-60.20.2.x86_64", "product_id": "kernel-ec2-extra-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.51-60.20.1.x86_64", "product": { "name": "kernel-obs-build-3.12.51-60.20.1.x86_64", "product_id": "kernel-obs-build-3.12.51-60.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-default-base-3.12.51-60.20.2.x86_64", "product_id": "kernel-default-base-3.12.51-60.20.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.51-60.20.2.x86_64", "product": { "name": "kernel-xen-base-3.12.51-60.20.2.x86_64", "product_id": "kernel-xen-base-3.12.51-60.20.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-devel-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-macros-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-source-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-syms-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-ec2-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-docs-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.51-60.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.51-60.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.51-60.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x" }, "product_reference": "kernel-obs-build-3.12.51-60.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.51-60.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.51-60.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-man-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-devel-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-macros-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-source-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-syms-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-syms-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-syms-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-base-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-default-man-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-devel-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-macros-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch" }, "product_reference": "kernel-source-3.12.51-60.20.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le" }, "product_reference": "kernel-syms-3.12.51-60.20.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x" }, "product_reference": "kernel-syms-3.12.51-60.20.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-syms-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.51-60.20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0272" } ], "notes": [ { "category": "general", "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0272", "url": "https://www.suse.com/security/cve/CVE-2015-0272" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-0272", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-0272", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-0272", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-0272", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "low" } ], "title": "CVE-2015-0272" }, { "cve": "CVE-2015-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2925" } ], "notes": [ { "category": "general", "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2925", "url": "https://www.suse.com/security/cve/CVE-2015-2925" }, { "category": "external", "summary": "SUSE Bug 926238 for CVE-2015-2925", "url": "https://bugzilla.suse.com/926238" }, { "category": "external", "summary": "SUSE Bug 951625 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951625" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-2925", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-2925", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "moderate" } ], "title": "CVE-2015-2925" }, { "cve": "CVE-2015-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5156" } ], "notes": [ { "category": "general", "text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5156", "url": "https://www.suse.com/security/cve/CVE-2015-5156" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1123903" }, { "category": "external", "summary": "SUSE Bug 940776 for CVE-2015-5156", "url": "https://bugzilla.suse.com/940776" }, { "category": "external", "summary": "SUSE Bug 945048 for CVE-2015-5156", "url": "https://bugzilla.suse.com/945048" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-5156", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "moderate" } ], "title": "CVE-2015-5156" }, { "cve": "CVE-2015-7799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7799" } ], "notes": [ { "category": "general", "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7799", "url": "https://www.suse.com/security/cve/CVE-2015-7799" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7799", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 949936 for CVE-2015-7799", "url": "https://bugzilla.suse.com/949936" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7799", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "low" } ], "title": "CVE-2015-7799" }, { "cve": "CVE-2015-7872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7872" } ], "notes": [ { "category": "general", "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7872", "url": "https://www.suse.com/security/cve/CVE-2015-7872" }, { "category": "external", "summary": "SUSE Bug 951440 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951440" }, { "category": "external", "summary": "SUSE Bug 951542 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951542" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-7872", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-7872", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "moderate" } ], "title": "CVE-2015-7872" }, { "cve": "CVE-2015-7990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7990" } ], "notes": [ { "category": "general", "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7990", "url": "https://www.suse.com/security/cve/CVE-2015-7990" }, { "category": "external", "summary": "SUSE Bug 945825 for CVE-2015-7990", "url": "https://bugzilla.suse.com/945825" }, { "category": "external", "summary": "SUSE Bug 952384 for CVE-2015-7990", "url": "https://bugzilla.suse.com/952384" }, { "category": "external", "summary": "SUSE Bug 953052 for CVE-2015-7990", "url": "https://bugzilla.suse.com/953052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "low" } ], "title": "CVE-2015-7990" }, { "cve": "CVE-2015-8215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8215" } ], "notes": [ { "category": "general", "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8215", "url": "https://www.suse.com/security/cve/CVE-2015-8215" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-8215", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 944296 for CVE-2015-8215", "url": "https://bugzilla.suse.com/944296" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-8215", "url": "https://bugzilla.suse.com/951638" }, { "category": "external", "summary": "SUSE Bug 955354 for CVE-2015-8215", "url": "https://bugzilla.suse.com/955354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-12-17T12:08:13Z", "details": "low" } ], "title": "CVE-2015-8215" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…