Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-3332 (GCVE-0-2015-3332)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T05:47:57.725Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/14/14"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951"
},
{
"name": "DSA-3237",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2015/dsa-3237"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.debian.org/782515"
},
{
"name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://article.gmane.org/gmane.linux.network/359588"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-04-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-06-02T16:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/14/14"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951"
},
{
"name": "DSA-3237",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2015/dsa-3237"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.debian.org/782515"
},
{
"name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://article.gmane.org/gmane.linux.network/359588"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-3332",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/14/14"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951"
},
{
"name": "DSA-3237",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3237"
},
{
"name": "https://bugs.debian.org/782515",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/782515"
},
{
"name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.linux.network/359588"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-3332",
"datePublished": "2015-05-27T10:00:00",
"dateReserved": "2015-04-17T00:00:00",
"dateUpdated": "2024-08-06T05:47:57.725Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2015-3332\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-05-27T10:59:08.860\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.\"},{\"lang\":\"es\",\"value\":\"Cierto backport en la implementaci\u00f3n TCP Fast Open para el kernel de Linux anterior a 3.18 no mantiene correctamente un valor de contador, lo que permite a usuarios locales causar una denegaci\u00f3n de servicio (ca\u00edda de sistema) a trav\u00e9s de la caracter\u00edstica Fast Open, tal y como fue demostrado mediante la visita a la URL chrome://flags/#enable-tcp-fast-open cuando utiliza ciertos builds del kernel 3.10.x hasta 3.16.x, incluyendo lanzamientos de mantenimiento a largo plazo y builds ckt (tambi\u00e9n conocidos como Canonical Kernel Team).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C8919F1-CD33-437E-9627-69352B276BA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.17.8\",\"matchCriteriaId\":\"D096AE24-5BB5-4ED2-8D2B-DC2AE8012E40\"}]}]}],\"references\":[{\"url\":\"http://article.gmane.org/gmane.linux.network/359588\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3237\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/14/14\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.debian.org/782515\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1213951\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://article.gmane.org/gmane.linux.network/359588\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/14/14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.debian.org/782515\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1213951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
suse-su-2015:1071-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 kernel was updated to version 3.12.43 to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n\n- CVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 did not properly perform RIP changes, which allowed guest OS users to cause a denial of service (guest OS crash) via a crafted application (bsc#899192).\n- CVE-2014-8086: Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allowed local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag (bsc#900881).\n- CVE-2014-8159: The InfiniBand (IB) implementation did not properly restrict use of User Verbs for registration of memory regions, which allowed local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/ (bsc#914742).\n- CVE-2015-1465: The IPv4 implementation in the Linux kernel before 3.18.8 did not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allowed remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets (bsc#916225).\n- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 used an incorrect data type in a sysctl table, which allowed local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry (bsc#919007).\n- CVE-2015-2042: net/rds/sysctl.c in the Linux kernel before 3.19 used an incorrect data type in a sysctl table, which allowed local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry (bsc#919018).\n- CVE-2015-2666: Fixed a flaw that allowed crafted microcode to overflow the kernel stack (bsc#922944).\n- CVE-2015-2830: Fixed int80 fork from 64-bit tasks mishandling (bsc#926240).\n- CVE-2015-2922: Fixed possible denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements (bsc#922583).\n- CVE-2015-3331: Fixed buffer overruns in RFC4106 implementation using AESNI (bsc#927257).\n- CVE-2015-3332: Fixed TCP Fast Open local DoS (bsc#928135).\n- CVE-2015-3339: Fixed race condition flaw between the chown() and execve() system calls which could have lead to local privilege escalation (bsc#928130).\n- CVE-2015-3636: Fixed use-after-free in ping sockets which could have lead to local privilege escalation (bsc#929525).\n\nThe following non-security bugs were fixed:\n\n- /proc/stat: convert to single_open_size() (bsc#928122).\n- ACPI / sysfs: Treat the count field of counter_show() as unsigned (bsc#909312).\n- Automatically Provide/Obsolete all subpackages of old flavors (bsc#925567)\n- Btrfs: btrfs_release_extent_buffer_page did not free pages of dummy extent (bsc#930226).\n- Btrfs: fix inode eviction infinite loop after cloning into it (bsc#930224).\n- Btrfs: fix inode eviction infinite loop after extent_same ioctl (bsc#930224).\n- Btrfs: fix log tree corruption when fs mounted with -o discard (bsc#927116).\n- Btrfs: fix up bounds checking in lseek (bsc#927115).\n- Fix rtworkqueues crash. Calling __sched_setscheduler() in interrupt context is forbidden, and destroy_worker() did so in the timer interrupt with a nohz_full config. Preclude that possibility for both boot options.\n- Input: psmouse - add psmouse_matches_pnp_id helper function (bsc#929092).\n- Input: synaptics - fix middle button on Lenovo 2015 products (bsc#929092).\n- Input: synaptics - handle spurious release of trackstick buttons (bsc#929092).\n- Input: synaptics - re-route tracksticks buttons on the Lenovo 2015 series (bsc#929092).\n- Input: synaptics - remove TOPBUTTONPAD property for Lenovos 2015 (bsc#929092).\n- Input: synaptics - retrieve the extended capabilities in query $10 (bsc#929092).\n- NFS: Add attribute update barriers to nfs_setattr_update_inode() (bsc#920262).\n- NFS: restore kabi after change to nfs_setattr_update_inode (bsc#920262).\n- af_iucv: fix AF_IUCV sendmsg() errno (bsc#927308, LTC#123304).\n- audit: do not reject all AUDIT_INODE filter types (bsc#927455).\n- bnx2x: Fix kdump when iommu=on (bsc#921769).\n- cpufreq: fix a NULL pointer dereference in __cpufreq_governor() (bsc#924664).\n- dasd: Fix device having no paths after suspend/resume (bsc#927308, LTC#123896).\n- dasd: Fix inability to set a DASD device offline (bsc#927308, LTC#123905).\n- dasd: Fix unresumed device after suspend/resume (bsc#927308, LTC#123892).\n- dasd: Missing partition after online processing (bsc#917125, LTC#120565).\n- drm/radeon/cik: Add macrotile mode array query (bsc#927285).\n- drm/radeon: fix display tiling setup on SI (bsc#927285).\n- drm/radeon: set correct number of banks for CIK chips in DCE (bsc#927285).\n- iommu/amd: Correctly encode huge pages in iommu page tables (bsc#931014).\n- iommu/amd: Optimize alloc_new_range for new fetch_pte interface (bsc#931014).\n- iommu/amd: Optimize amd_iommu_iova_to_phys for new fetch_pte interface (bsc#931014).\n- iommu/amd: Optimize iommu_unmap_page for new fetch_pte interface (bsc#931014).\n- iommu/amd: Return the pte page-size in fetch_pte (bsc#931014).\n- ipc/shm.c: fix overly aggressive shmdt() when calls span multiple segments (ipc fixes).\n- ipmi: Turn off all activity on an idle ipmi interface (bsc#915540).\n- ixgbe: fix detection of SFP+ capable interfaces (bsc#922734).\n- kgr: add error code to the message in kgr_revert_replaced_funs.\n- kgr: add kgraft annotations to kthreads wait_event_freezable() API calls.\n- kgr: correct error handling of the first patching stage.\n- kgr: handle the delayed patching of the modules.\n- kgr: handle the failure of finalization stage.\n- kgr: return error in kgr_init if notifier registration fails.\n- kgr: take switching of the fops out of kgr_patch_code to new function.\n- kgr: use for_each_process_thread (bsc#929883).\n- kgr: use kgr_in_progress for all threads (bnc#929883).\n- libata: Blacklist queued TRIM on Samsung SSD 850 Pro (bsc#926156).\n- mlx4: Call dev_kfree_skby_any instead of dev_kfree_skb (bsc#928708).\n- mm, numa: really disable NUMA balancing by default on single node machines (Automatic NUMA Balancing).\n- mm: vmscan: do not throttle based on pfmemalloc reserves if node has no reclaimable pages (bsc#924803, VM Functionality).\n- net/mlx4: Cache line CQE/EQE stride fixes (bsc#927084).\n- net/mlx4_core: Cache line EQE size support (bsc#927084).\n- net/mlx4_core: Enable CQE/EQE stride support (bsc#927084).\n- net/mlx4_en: Add mlx4_en_get_cqe helper (bsc#927084).\n- perf/x86/amd/ibs: Update IBS MSRs and feature definitions.\n- powerpc/mm: Fix mmap errno when MAP_FIXED is set and mapping exceeds the allowed address space (bsc#930669).\n- powerpc/numa: Add ability to disable and debug topology updates (bsc#924809).\n- powerpc/numa: Enable CONFIG_HAVE_MEMORYLESS_NODES (bsc#924809).\n- powerpc/numa: Enable USE_PERCPU_NUMA_NODE_ID (bsc#924809).\n- powerpc/numa: check error return from proc_create (bsc#924809).\n- powerpc/numa: ensure per-cpu NUMA mappings are correct on topology update (bsc#924809).\n- powerpc/numa: use cached value of update-\u0026gt;cpu in update_cpu_topology (bsc#924809).\n- powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH (bsc#928141).\n- powerpc/pseries: Introduce api_version to migration sysfs interface (bsc#926314).\n- powerpc/pseries: Little endian fixes for post mobility device tree update (bsc#926314).\n- powerpc/pseries: Simplify check for suspendability during suspend/migration (bsc#926314).\n- powerpc: Fix sys_call_table declaration to enable syscall tracing.\n- powerpc: Fix warning reported by verify_cpu_node_mapping() (bsc#924809).\n- powerpc: Only set numa node information for present cpus at boottime (bsc#924809).\n- powerpc: reorder per-cpu NUMA information initialization (bsc#924809).\n- powerpc: some changes in numa_setup_cpu() (bsc#924809).\n- quota: Fix use of units in quota getting / setting interfaces (bsc#913232).\n- rpm/kernel-binary.spec.in: Fix build if there is no *.crt file\n- rpm/kernel-obs-qa.spec.in: Do not fail if the kernel versions do not match\n- s390/bpf: Fix ALU_NEG (A = -A) (bsc#917125, LTC#121759).\n- s390/bpf: Fix JMP_JGE_K (A \u003e= K) and JMP_JGT_K (A \u003e K) (bsc#917125, LTC#121759).\n- s390/bpf: Fix JMP_JGE_X (A \u003e X) and JMP_JGT_X (A \u003e= X) (bsc#917125, LTC#121759).\n- s390/bpf: Fix offset parameter for skb_copy_bits() (bsc#917125, LTC#121759).\n- s390/bpf: Fix sk_load_byte_msh() (bsc#917125, LTC#121759).\n- s390/bpf: Fix skb_copy_bits() parameter passing (bsc#917125, LTC#121759).\n- s390/bpf: Zero extend parameters before calling C function (bsc#917125, LTC#121759).\n- s390/sclp: Consolidate early sclp init calls to sclp_early_detect() (bsc#917125, LTC#122429).\n- s390/sclp: Determine HSA size dynamically for zfcpdump (bsc#917125, LTC#122429).\n- s390/sclp: Move declarations for sclp_sdias into separate header file (bsc#917125, LTC#122429).\n- s390/sclp: Move early code from sclp_cmd.c to sclp_early.c (bsc#917125, LTC#122429).\n- s390/sclp: replace uninitialized early_event_mask_sccb variable with sccb_early (bsc#917125, LTC#122429).\n- s390/sclp: revert smp-detect-possible-cpus.patch (bsc#917125, LTC#122429).\n- s390/sclp_early: Add function to detect sclp console capabilities (bsc#917125, LTC#122429).\n- s390/sclp_early: Get rid of sclp_early_read_info_sccb_valid (bsc#917125, LTC#122429).\n- s390/sclp_early: Pass sccb pointer to every *_detect() function (bsc#917125, LTC#122429).\n- s390/sclp_early: Replace early_read_info_sccb with sccb_early (bsc#917125, LTC#122429).\n- s390/sclp_early: Return correct HSA block count also for zero (bsc#917125, LTC#122429).\n- s390/smp: limit number of cpus in possible cpu mask (bsc#917125, LTC#122429).\n- s390: kgr, change the kgraft state only if enabled.\n- sched, time: Fix lock inversion in thread_group_cputime()\n- sched: Fix potential near-infinite distribute_cfs_runtime() loop (bsc#930786)\n- sched: Robustify topology setup (bsc#924809).\n- seqlock: Add irqsave variant of read_seqbegin_or_lock() (Time scalability).\n- storvsc: Set the SRB flags correctly when no data transfer is needed (bsc#931130).\n- x86/apic/uv: Update the APIC UV OEM check (bsc#929145).\n- x86/apic/uv: Update the UV APIC HUB check (bsc#929145).\n- x86/apic/uv: Update the UV APIC driver check (bsc#929145).\n- x86/microcode/intel: Guard against stack overflow in the loader (bsc#922944).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-2015-269,SUSE-SLE-Live-Patching-12-2015-269,SUSE-SLE-Module-Public-Cloud-12-2015-269,SUSE-SLE-SDK-12-2015-269,SUSE-SLE-SERVER-12-2015-269,SUSE-SLE-WE-12-2015-269",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1071-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2015:1071-1",
"url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151071-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2015:1071-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html"
},
{
"category": "self",
"summary": "SUSE Bug 899192",
"url": "https://bugzilla.suse.com/899192"
},
{
"category": "self",
"summary": "SUSE Bug 900881",
"url": "https://bugzilla.suse.com/900881"
},
{
"category": "self",
"summary": "SUSE Bug 909312",
"url": "https://bugzilla.suse.com/909312"
},
{
"category": "self",
"summary": "SUSE Bug 913232",
"url": "https://bugzilla.suse.com/913232"
},
{
"category": "self",
"summary": "SUSE Bug 914742",
"url": "https://bugzilla.suse.com/914742"
},
{
"category": "self",
"summary": "SUSE Bug 915540",
"url": "https://bugzilla.suse.com/915540"
},
{
"category": "self",
"summary": "SUSE Bug 916225",
"url": "https://bugzilla.suse.com/916225"
},
{
"category": "self",
"summary": "SUSE Bug 917125",
"url": "https://bugzilla.suse.com/917125"
},
{
"category": "self",
"summary": "SUSE Bug 919007",
"url": "https://bugzilla.suse.com/919007"
},
{
"category": "self",
"summary": "SUSE Bug 919018",
"url": "https://bugzilla.suse.com/919018"
},
{
"category": "self",
"summary": "SUSE Bug 920262",
"url": "https://bugzilla.suse.com/920262"
},
{
"category": "self",
"summary": "SUSE Bug 921769",
"url": "https://bugzilla.suse.com/921769"
},
{
"category": "self",
"summary": "SUSE Bug 922583",
"url": "https://bugzilla.suse.com/922583"
},
{
"category": "self",
"summary": "SUSE Bug 922734",
"url": "https://bugzilla.suse.com/922734"
},
{
"category": "self",
"summary": "SUSE Bug 922944",
"url": "https://bugzilla.suse.com/922944"
},
{
"category": "self",
"summary": "SUSE Bug 924664",
"url": "https://bugzilla.suse.com/924664"
},
{
"category": "self",
"summary": "SUSE Bug 924803",
"url": "https://bugzilla.suse.com/924803"
},
{
"category": "self",
"summary": "SUSE Bug 924809",
"url": "https://bugzilla.suse.com/924809"
},
{
"category": "self",
"summary": "SUSE Bug 925567",
"url": "https://bugzilla.suse.com/925567"
},
{
"category": "self",
"summary": "SUSE Bug 926156",
"url": "https://bugzilla.suse.com/926156"
},
{
"category": "self",
"summary": "SUSE Bug 926240",
"url": "https://bugzilla.suse.com/926240"
},
{
"category": "self",
"summary": "SUSE Bug 926314",
"url": "https://bugzilla.suse.com/926314"
},
{
"category": "self",
"summary": "SUSE Bug 927084",
"url": "https://bugzilla.suse.com/927084"
},
{
"category": "self",
"summary": "SUSE Bug 927115",
"url": "https://bugzilla.suse.com/927115"
},
{
"category": "self",
"summary": "SUSE Bug 927116",
"url": "https://bugzilla.suse.com/927116"
},
{
"category": "self",
"summary": "SUSE Bug 927257",
"url": "https://bugzilla.suse.com/927257"
},
{
"category": "self",
"summary": "SUSE Bug 927285",
"url": "https://bugzilla.suse.com/927285"
},
{
"category": "self",
"summary": "SUSE Bug 927308",
"url": "https://bugzilla.suse.com/927308"
},
{
"category": "self",
"summary": "SUSE Bug 927455",
"url": "https://bugzilla.suse.com/927455"
},
{
"category": "self",
"summary": "SUSE Bug 928122",
"url": "https://bugzilla.suse.com/928122"
},
{
"category": "self",
"summary": "SUSE Bug 928130",
"url": "https://bugzilla.suse.com/928130"
},
{
"category": "self",
"summary": "SUSE Bug 928135",
"url": "https://bugzilla.suse.com/928135"
},
{
"category": "self",
"summary": "SUSE Bug 928141",
"url": "https://bugzilla.suse.com/928141"
},
{
"category": "self",
"summary": "SUSE Bug 928708",
"url": "https://bugzilla.suse.com/928708"
},
{
"category": "self",
"summary": "SUSE Bug 929092",
"url": "https://bugzilla.suse.com/929092"
},
{
"category": "self",
"summary": "SUSE Bug 929145",
"url": "https://bugzilla.suse.com/929145"
},
{
"category": "self",
"summary": "SUSE Bug 929525",
"url": "https://bugzilla.suse.com/929525"
},
{
"category": "self",
"summary": "SUSE Bug 929883",
"url": "https://bugzilla.suse.com/929883"
},
{
"category": "self",
"summary": "SUSE Bug 930224",
"url": "https://bugzilla.suse.com/930224"
},
{
"category": "self",
"summary": "SUSE Bug 930226",
"url": "https://bugzilla.suse.com/930226"
},
{
"category": "self",
"summary": "SUSE Bug 930669",
"url": "https://bugzilla.suse.com/930669"
},
{
"category": "self",
"summary": "SUSE Bug 930786",
"url": "https://bugzilla.suse.com/930786"
},
{
"category": "self",
"summary": "SUSE Bug 931014",
"url": "https://bugzilla.suse.com/931014"
},
{
"category": "self",
"summary": "SUSE Bug 931130",
"url": "https://bugzilla.suse.com/931130"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3647 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8086 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8159 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1465 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2041 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2041/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2042 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2666 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2830 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2922 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3331 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3332 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3339 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3636 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3636/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2015-06-11T16:05:11Z",
"generator": {
"date": "2015-06-11T16:05:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2015:1071-1",
"initial_release_date": "2015-06-11T16:05:11Z",
"revision_history": [
{
"date": "2015-06-11T16:05:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.43-52.6.1.noarch",
"product": {
"name": "kernel-devel-3.12.43-52.6.1.noarch",
"product_id": "kernel-devel-3.12.43-52.6.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.43-52.6.1.noarch",
"product": {
"name": "kernel-macros-3.12.43-52.6.1.noarch",
"product_id": "kernel-macros-3.12.43-52.6.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.43-52.6.1.noarch",
"product": {
"name": "kernel-source-3.12.43-52.6.1.noarch",
"product_id": "kernel-source-3.12.43-52.6.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-3.12.43-52.6.2.noarch",
"product": {
"name": "kernel-docs-3.12.43-52.6.2.noarch",
"product_id": "kernel-docs-3.12.43-52.6.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.43-52.6.2.ppc64le",
"product": {
"name": "kernel-obs-build-3.12.43-52.6.2.ppc64le",
"product_id": "kernel-obs-build-3.12.43-52.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.43-52.6.1.ppc64le",
"product": {
"name": "kernel-default-3.12.43-52.6.1.ppc64le",
"product_id": "kernel-default-3.12.43-52.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.43-52.6.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.43-52.6.1.ppc64le",
"product_id": "kernel-default-base-3.12.43-52.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.43-52.6.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.43-52.6.1.ppc64le",
"product_id": "kernel-default-devel-3.12.43-52.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.43-52.6.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.43-52.6.1.ppc64le",
"product_id": "kernel-syms-3.12.43-52.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.43-52.6.2.s390x",
"product": {
"name": "kernel-obs-build-3.12.43-52.6.2.s390x",
"product_id": "kernel-obs-build-3.12.43-52.6.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.43-52.6.1.s390x",
"product": {
"name": "kernel-default-3.12.43-52.6.1.s390x",
"product_id": "kernel-default-3.12.43-52.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.43-52.6.1.s390x",
"product": {
"name": "kernel-default-base-3.12.43-52.6.1.s390x",
"product_id": "kernel-default-base-3.12.43-52.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.43-52.6.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.43-52.6.1.s390x",
"product_id": "kernel-default-devel-3.12.43-52.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.43-52.6.1.s390x",
"product": {
"name": "kernel-default-man-3.12.43-52.6.1.s390x",
"product_id": "kernel-default-man-3.12.43-52.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.43-52.6.1.s390x",
"product": {
"name": "kernel-syms-3.12.43-52.6.1.s390x",
"product_id": "kernel-syms-3.12.43-52.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-default-3.12.43-52.6.1.x86_64",
"product_id": "kernel-default-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.43-52.6.1.x86_64",
"product_id": "kernel-default-devel-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-default-extra-3.12.43-52.6.1.x86_64",
"product_id": "kernel-default-extra-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-syms-3.12.43-52.6.1.x86_64",
"product_id": "kernel-syms-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-xen-3.12.43-52.6.1.x86_64",
"product_id": "kernel-xen-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.43-52.6.1.x86_64",
"product_id": "kernel-xen-devel-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"product": {
"name": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"product_id": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"product": {
"name": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"product_id": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.43-52.6.1.x86_64",
"product_id": "kernel-ec2-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.43-52.6.2.x86_64",
"product": {
"name": "kernel-obs-build-3.12.43-52.6.2.x86_64",
"product_id": "kernel-obs-build-3.12.43-52.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.43-52.6.1.x86_64",
"product_id": "kernel-default-base-3.12.43-52.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.43-52.6.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.43-52.6.1.x86_64",
"product_id": "kernel-xen-base-3.12.43-52.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12",
"product": {
"name": "SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12",
"product": {
"name": "SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12",
"product_id": "SUSE Linux Enterprise Workstation Extension 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-extra-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch"
},
"product_reference": "kernel-devel-3.12.43-52.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch"
},
"product_reference": "kernel-macros-3.12.43-52.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch"
},
"product_reference": "kernel-source-3.12.43-52.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-syms-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-xen-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64"
},
"product_reference": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64"
},
"product_reference": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.12.43-52.6.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch"
},
"product_reference": "kernel-docs-3.12.43-52.6.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.43-52.6.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le"
},
"product_reference": "kernel-obs-build-3.12.43-52.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.43-52.6.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x"
},
"product_reference": "kernel-obs-build-3.12.43-52.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.43-52.6.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64"
},
"product_reference": "kernel-obs-build-3.12.43-52.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le"
},
"product_reference": "kernel-default-3.12.43-52.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-default-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.43-52.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-default-base-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.43-52.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-default-man-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch"
},
"product_reference": "kernel-devel-3.12.43-52.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch"
},
"product_reference": "kernel-macros-3.12.43-52.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch"
},
"product_reference": "kernel-source-3.12.43-52.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.43-52.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-syms-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-syms-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-xen-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le"
},
"product_reference": "kernel-default-3.12.43-52.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-default-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.43-52.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-default-base-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.43-52.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-default-man-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch"
},
"product_reference": "kernel-devel-3.12.43-52.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch"
},
"product_reference": "kernel-macros-3.12.43-52.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch"
},
"product_reference": "kernel-source-3.12.43-52.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.43-52.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x"
},
"product_reference": "kernel-syms-3.12.43-52.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-syms-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-xen-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12",
"product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
},
"product_reference": "kernel-default-extra-3.12.43-52.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-3647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-3647"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-3647",
"url": "https://www.suse.com/security/cve/CVE-2014-3647"
},
{
"category": "external",
"summary": "SUSE Bug 1013038 for CVE-2014-3647",
"url": "https://bugzilla.suse.com/1013038"
},
{
"category": "external",
"summary": "SUSE Bug 1134834 for CVE-2014-3647",
"url": "https://bugzilla.suse.com/1134834"
},
{
"category": "external",
"summary": "SUSE Bug 899192 for CVE-2014-3647",
"url": "https://bugzilla.suse.com/899192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2014-3647"
},
{
"cve": "CVE-2014-8086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8086"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8086",
"url": "https://www.suse.com/security/cve/CVE-2014-8086"
},
{
"category": "external",
"summary": "SUSE Bug 900881 for CVE-2014-8086",
"url": "https://bugzilla.suse.com/900881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2014-8086"
},
{
"cve": "CVE-2014-8159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8159"
}
],
"notes": [
{
"category": "general",
"text": "The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8159",
"url": "https://www.suse.com/security/cve/CVE-2014-8159"
},
{
"category": "external",
"summary": "SUSE Bug 903967 for CVE-2014-8159",
"url": "https://bugzilla.suse.com/903967"
},
{
"category": "external",
"summary": "SUSE Bug 914742 for CVE-2014-8159",
"url": "https://bugzilla.suse.com/914742"
},
{
"category": "external",
"summary": "SUSE Bug 939241 for CVE-2014-8159",
"url": "https://bugzilla.suse.com/939241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2014-8159"
},
{
"cve": "CVE-2015-1465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1465"
}
],
"notes": [
{
"category": "general",
"text": "The IPv4 implementation in the Linux kernel before 3.18.8 does not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allows remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1465",
"url": "https://www.suse.com/security/cve/CVE-2015-1465"
},
{
"category": "external",
"summary": "SUSE Bug 916225 for CVE-2015-1465",
"url": "https://bugzilla.suse.com/916225"
},
{
"category": "external",
"summary": "SUSE Bug 939044 for CVE-2015-1465",
"url": "https://bugzilla.suse.com/939044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "important"
}
],
"title": "CVE-2015-1465"
},
{
"cve": "CVE-2015-2041",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2041"
}
],
"notes": [
{
"category": "general",
"text": "net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2041",
"url": "https://www.suse.com/security/cve/CVE-2015-2041"
},
{
"category": "external",
"summary": "SUSE Bug 903967 for CVE-2015-2041",
"url": "https://bugzilla.suse.com/903967"
},
{
"category": "external",
"summary": "SUSE Bug 919007 for CVE-2015-2041",
"url": "https://bugzilla.suse.com/919007"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2015-2041"
},
{
"cve": "CVE-2015-2042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2042"
}
],
"notes": [
{
"category": "general",
"text": "net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2042",
"url": "https://www.suse.com/security/cve/CVE-2015-2042"
},
{
"category": "external",
"summary": "SUSE Bug 903967 for CVE-2015-2042",
"url": "https://bugzilla.suse.com/903967"
},
{
"category": "external",
"summary": "SUSE Bug 919018 for CVE-2015-2042",
"url": "https://bugzilla.suse.com/919018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2015-2042"
},
{
"cve": "CVE-2015-2666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2666"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2666",
"url": "https://www.suse.com/security/cve/CVE-2015-2666"
},
{
"category": "external",
"summary": "SUSE Bug 922944 for CVE-2015-2666",
"url": "https://bugzilla.suse.com/922944"
},
{
"category": "external",
"summary": "SUSE Bug 939044 for CVE-2015-2666",
"url": "https://bugzilla.suse.com/939044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2015-2666"
},
{
"cve": "CVE-2015-2830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2830"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2830",
"url": "https://www.suse.com/security/cve/CVE-2015-2830"
},
{
"category": "external",
"summary": "SUSE Bug 903967 for CVE-2015-2830",
"url": "https://bugzilla.suse.com/903967"
},
{
"category": "external",
"summary": "SUSE Bug 926240 for CVE-2015-2830",
"url": "https://bugzilla.suse.com/926240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2015-2830"
},
{
"cve": "CVE-2015-2922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2922"
}
],
"notes": [
{
"category": "general",
"text": "The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2922",
"url": "https://www.suse.com/security/cve/CVE-2015-2922"
},
{
"category": "external",
"summary": "SUSE Bug 903967 for CVE-2015-2922",
"url": "https://bugzilla.suse.com/903967"
},
{
"category": "external",
"summary": "SUSE Bug 922583 for CVE-2015-2922",
"url": "https://bugzilla.suse.com/922583"
},
{
"category": "external",
"summary": "SUSE Bug 926223 for CVE-2015-2922",
"url": "https://bugzilla.suse.com/926223"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2015-2922"
},
{
"cve": "CVE-2015-3331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3331"
}
],
"notes": [
{
"category": "general",
"text": "The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3331",
"url": "https://www.suse.com/security/cve/CVE-2015-3331"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2015-3331",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 927257 for CVE-2015-3331",
"url": "https://bugzilla.suse.com/927257"
},
{
"category": "external",
"summary": "SUSE Bug 931231 for CVE-2015-3331",
"url": "https://bugzilla.suse.com/931231"
},
{
"category": "external",
"summary": "SUSE Bug 939262 for CVE-2015-3331",
"url": "https://bugzilla.suse.com/939262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2015-3331"
},
{
"cve": "CVE-2015-3332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3332"
}
],
"notes": [
{
"category": "general",
"text": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3332",
"url": "https://www.suse.com/security/cve/CVE-2015-3332"
},
{
"category": "external",
"summary": "SUSE Bug 903967 for CVE-2015-3332",
"url": "https://bugzilla.suse.com/903967"
},
{
"category": "external",
"summary": "SUSE Bug 928135 for CVE-2015-3332",
"url": "https://bugzilla.suse.com/928135"
},
{
"category": "external",
"summary": "SUSE Bug 992991 for CVE-2015-3332",
"url": "https://bugzilla.suse.com/992991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2015-3332"
},
{
"cve": "CVE-2015-3339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3339"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3339",
"url": "https://www.suse.com/security/cve/CVE-2015-3339"
},
{
"category": "external",
"summary": "SUSE Bug 903967 for CVE-2015-3339",
"url": "https://bugzilla.suse.com/903967"
},
{
"category": "external",
"summary": "SUSE Bug 928130 for CVE-2015-3339",
"url": "https://bugzilla.suse.com/928130"
},
{
"category": "external",
"summary": "SUSE Bug 939263 for CVE-2015-3339",
"url": "https://bugzilla.suse.com/939263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2015-3339"
},
{
"cve": "CVE-2015-3636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3636"
}
],
"notes": [
{
"category": "general",
"text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3636",
"url": "https://www.suse.com/security/cve/CVE-2015-3636"
},
{
"category": "external",
"summary": "SUSE Bug 929525 for CVE-2015-3636",
"url": "https://bugzilla.suse.com/929525"
},
{
"category": "external",
"summary": "SUSE Bug 939277 for CVE-2015-3636",
"url": "https://bugzilla.suse.com/939277"
},
{
"category": "external",
"summary": "SUSE Bug 994624 for CVE-2015-3636",
"url": "https://bugzilla.suse.com/994624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-06-11T16:05:11Z",
"details": "moderate"
}
],
"title": "CVE-2015-3636"
}
]
}
CERTFR-2015-AVI-237
Vulnerability from certfr_avis
Une vulnérabilité a été corrigée dans le noyau Linux Ubuntu. Elle permet à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-3332",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3332"
}
],
"initial_release_date": "2015-05-26T00:00:00",
"last_revision_date": "2015-05-26T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-237",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-05-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003ele noyau\nLinux Ubuntu\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2619-1 du 23 mai 2015",
"url": "http://www.ubuntu.com/usn/usn-2619-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2620-1 du 23 mai 2015",
"url": "http://www.ubuntu.com/usn/usn-2620-1/"
}
]
}
CERTFR-2015-AVI-236
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2830"
},
{
"name": "CVE-2015-3331",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3331"
},
{
"name": "CVE-2015-2150",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2150"
},
{
"name": "CVE-2014-9715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9715"
},
{
"name": "CVE-2014-9710",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9710"
},
{
"name": "CVE-2015-3332",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3332"
}
],
"initial_release_date": "2015-05-20T00:00:00",
"last_revision_date": "2015-05-20T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-236",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-05-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau Linux \u003cspan\nclass=\"textit\"\u003eUbuntu\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, un d\u00e9ni de service\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2614-1 du 20 mai 2015",
"url": "http://www.ubuntu.com/usn/usn-2614-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2616-1 du 20 mai 2015",
"url": "http://www.ubuntu.com/usn/usn-2616-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2611-1 du 20 mai 2015",
"url": "http://www.ubuntu.com/usn/usn-2611-1/"
}
]
}
cnvd-2015-02761
Vulnerability from cnvd
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: https://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.75 https://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.39
| Name | ['Linux Kernel 2.6.32.65', 'Linux Kernel 3.2.68'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-3332"
}
},
"description": "Linux kernel\u662f\u4e00\u6b3e\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u5728\u542f\u7528TCP Fast Open\u65f6\uff0cLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u4f7f\u7cfb\u7edf\u5d29\u6e83\u3002",
"discovererName": "Linux",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.75 \r\nhttps://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.39",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-02761",
"openTime": "2015-04-28",
"patchDescription": "Linux kernel\u662f\u4e00\u6b3e\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u5728\u542f\u7528TCP Fast Open\u65f6\uff0cLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u4f7f\u7cfb\u7edf\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel TCP Fast Open\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Linux Kernel 2.6.32.65",
"Linux Kernel 3.2.68"
]
},
"referenceLink": "https://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.75 \r\nhttps://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.39",
"serverity": "\u4f4e",
"submitTime": "2015-04-26",
"title": "Linux kernel TCP Fast Open\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
ghsa-69wh-3xqf-4r4m
Vulnerability from github
A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.
{
"affected": [],
"aliases": [
"CVE-2015-3332"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-05-27T10:59:00Z",
"severity": "MODERATE"
},
"details": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.",
"id": "GHSA-69wh-3xqf-4r4m",
"modified": "2022-05-17T03:57:20Z",
"published": "2022-05-17T03:57:20Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3332"
},
{
"type": "WEB",
"url": "https://bugs.debian.org/782515"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951"
},
{
"type": "WEB",
"url": "http://article.gmane.org/gmane.linux.network/359588"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2015/dsa-3237"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2015/04/14/14"
}
],
"schema_version": "1.4.0",
"severity": []
}
gsd-2015-3332
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2015-3332",
"description": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.",
"id": "GSD-2015-3332",
"references": [
"https://www.suse.com/security/cve/CVE-2015-3332.html",
"https://www.debian.org/security/2015/dsa-3237",
"https://ubuntu.com/security/CVE-2015-3332",
"https://advisories.mageia.org/CVE-2015-3332.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-3332"
],
"details": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.",
"id": "GSD-2015-3332",
"modified": "2023-12-13T01:20:07.048894Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-3332",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/14/14"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951"
},
{
"name": "DSA-3237",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3237"
},
{
"name": "https://bugs.debian.org/782515",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/782515"
},
{
"name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.linux.network/359588"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.17.8",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-3332"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.debian.org/782515",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugs.debian.org/782515"
},
{
"name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly",
"refsource": "MLIST",
"tags": [],
"url": "http://article.gmane.org/gmane.linux.network/359588"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951"
},
{
"name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2015/04/14/14"
},
{
"name": "DSA-3237",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2015/dsa-3237"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2016-04-11T18:54Z",
"publishedDate": "2015-05-27T10:59Z"
}
}
}
fkie_cve-2015-3332
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://article.gmane.org/gmane.linux.network/359588 | ||
| cve@mitre.org | http://www.debian.org/security/2015/dsa-3237 | ||
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/04/14/14 | ||
| cve@mitre.org | https://bugs.debian.org/782515 | ||
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1213951 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://article.gmane.org/gmane.linux.network/359588 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3237 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/04/14/14 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/782515 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1213951 |
| Vendor | Product | Version | |
|---|---|---|---|
| debian | debian_linux | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C8919F1-CD33-437E-9627-69352B276BA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D096AE24-5BB5-4ED2-8D2B-DC2AE8012E40",
"versionEndIncluding": "3.17.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds."
},
{
"lang": "es",
"value": "Cierto backport en la implementaci\u00f3n TCP Fast Open para el kernel de Linux anterior a 3.18 no mantiene correctamente un valor de contador, lo que permite a usuarios locales causar una denegaci\u00f3n de servicio (ca\u00edda de sistema) a trav\u00e9s de la caracter\u00edstica Fast Open, tal y como fue demostrado mediante la visita a la URL chrome://flags/#enable-tcp-fast-open cuando utiliza ciertos builds del kernel 3.10.x hasta 3.16.x, incluyendo lanzamientos de mantenimiento a largo plazo y builds ckt (tambi\u00e9n conocidos como Canonical Kernel Team)."
}
],
"id": "CVE-2015-3332",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-05-27T10:59:08.860",
"references": [
{
"source": "cve@mitre.org",
"url": "http://article.gmane.org/gmane.linux.network/359588"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2015/dsa-3237"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2015/04/14/14"
},
{
"source": "cve@mitre.org",
"url": "https://bugs.debian.org/782515"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://article.gmane.org/gmane.linux.network/359588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2015/dsa-3237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2015/04/14/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugs.debian.org/782515"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.