Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-3332 (GCVE-0-2015-3332)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:47:57.725Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/14/14" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951" }, { "name": "DSA-3237", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3237" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/782515" }, { "name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://article.gmane.org/gmane.linux.network/359588" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-06-02T16:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/14/14" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951" }, { "name": "DSA-3237", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3237" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/782515" }, { "name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://article.gmane.org/gmane.linux.network/359588" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/14/14" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951" }, { "name": "DSA-3237", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3237" }, { "name": "https://bugs.debian.org/782515", "refsource": "CONFIRM", "url": "https://bugs.debian.org/782515" }, { "name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly", "refsource": "MLIST", "url": "http://article.gmane.org/gmane.linux.network/359588" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3332", "datePublished": "2015-05-27T10:00:00", "dateReserved": "2015-04-17T00:00:00", "dateUpdated": "2024-08-06T05:47:57.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-3332\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-05-27T10:59:08.860\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.\"},{\"lang\":\"es\",\"value\":\"Cierto backport en la implementaci\u00f3n TCP Fast Open para el kernel de Linux anterior a 3.18 no mantiene correctamente un valor de contador, lo que permite a usuarios locales causar una denegaci\u00f3n de servicio (ca\u00edda de sistema) a trav\u00e9s de la caracter\u00edstica Fast Open, tal y como fue demostrado mediante la visita a la URL chrome://flags/#enable-tcp-fast-open cuando utiliza ciertos builds del kernel 3.10.x hasta 3.16.x, incluyendo lanzamientos de mantenimiento a largo plazo y builds ckt (tambi\u00e9n conocidos como Canonical Kernel Team).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C8919F1-CD33-437E-9627-69352B276BA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.17.8\",\"matchCriteriaId\":\"D096AE24-5BB5-4ED2-8D2B-DC2AE8012E40\"}]}]}],\"references\":[{\"url\":\"http://article.gmane.org/gmane.linux.network/359588\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3237\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/14/14\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.debian.org/782515\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1213951\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://article.gmane.org/gmane.linux.network/359588\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/14/14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.debian.org/782515\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1213951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-69wh-3xqf-4r4m
Vulnerability from github
A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.
{ "affected": [], "aliases": [ "CVE-2015-3332" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-05-27T10:59:00Z", "severity": "MODERATE" }, "details": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.", "id": "GHSA-69wh-3xqf-4r4m", "modified": "2022-05-17T03:57:20Z", "published": "2022-05-17T03:57:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3332" }, { "type": "WEB", "url": "https://bugs.debian.org/782515" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951" }, { "type": "WEB", "url": "http://article.gmane.org/gmane.linux.network/359588" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3237" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2015/04/14/14" } ], "schema_version": "1.4.0", "severity": [] }
cnvd-2015-02761
Vulnerability from cnvd
Title: Linux kernel TCP Fast Open拒绝服务漏洞
Description:
Linux kernel是一款开源操作系统。
在启用TCP Fast Open时,Linux kernel存在安全漏洞,允许本地攻击者可利用漏洞提交特殊请求使系统崩溃。
Severity: 低
Patch Name: Linux kernel TCP Fast Open拒绝服务漏洞的补丁
Patch Description:
Linux kernel是一款开源操作系统。
在启用TCP Fast Open时,Linux kernel存在安全漏洞,允许本地攻击者可利用漏洞提交特殊请求使系统崩溃。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: https://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.75 https://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.39
Reference: https://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.75 https://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.39
Name | ['Linux Kernel 2.6.32.65', 'Linux Kernel 3.2.68'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2015-3332" } }, "description": "Linux kernel\u662f\u4e00\u6b3e\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u5728\u542f\u7528TCP Fast Open\u65f6\uff0cLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u4f7f\u7cfb\u7edf\u5d29\u6e83\u3002", "discovererName": "Linux", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.75 \r\nhttps://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.39", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2015-02761", "openTime": "2015-04-28", "patchDescription": "Linux kernel\u662f\u4e00\u6b3e\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u5728\u542f\u7528TCP Fast Open\u65f6\uff0cLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u4f7f\u7cfb\u7edf\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Linux kernel TCP Fast Open\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Linux Kernel 2.6.32.65", "Linux Kernel 3.2.68" ] }, "referenceLink": "https://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.75 \r\nhttps://kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.39", "serverity": "\u4f4e", "submitTime": "2015-04-26", "title": "Linux kernel TCP Fast Open\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
suse-su-2015:1071-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 kernel was updated to version 3.12.43 to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n\n- CVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 did not properly perform RIP changes, which allowed guest OS users to cause a denial of service (guest OS crash) via a crafted application (bsc#899192).\n- CVE-2014-8086: Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allowed local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag (bsc#900881).\n- CVE-2014-8159: The InfiniBand (IB) implementation did not properly restrict use of User Verbs for registration of memory regions, which allowed local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/ (bsc#914742).\n- CVE-2015-1465: The IPv4 implementation in the Linux kernel before 3.18.8 did not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allowed remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets (bsc#916225).\n- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 used an incorrect data type in a sysctl table, which allowed local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry (bsc#919007).\n- CVE-2015-2042: net/rds/sysctl.c in the Linux kernel before 3.19 used an incorrect data type in a sysctl table, which allowed local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry (bsc#919018).\n- CVE-2015-2666: Fixed a flaw that allowed crafted microcode to overflow the kernel stack (bsc#922944).\n- CVE-2015-2830: Fixed int80 fork from 64-bit tasks mishandling (bsc#926240).\n- CVE-2015-2922: Fixed possible denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements (bsc#922583).\n- CVE-2015-3331: Fixed buffer overruns in RFC4106 implementation using AESNI (bsc#927257).\n- CVE-2015-3332: Fixed TCP Fast Open local DoS (bsc#928135).\n- CVE-2015-3339: Fixed race condition flaw between the chown() and execve() system calls which could have lead to local privilege escalation (bsc#928130).\n- CVE-2015-3636: Fixed use-after-free in ping sockets which could have lead to local privilege escalation (bsc#929525).\n\nThe following non-security bugs were fixed:\n\n- /proc/stat: convert to single_open_size() (bsc#928122).\n- ACPI / sysfs: Treat the count field of counter_show() as unsigned (bsc#909312).\n- Automatically Provide/Obsolete all subpackages of old flavors (bsc#925567)\n- Btrfs: btrfs_release_extent_buffer_page did not free pages of dummy extent (bsc#930226).\n- Btrfs: fix inode eviction infinite loop after cloning into it (bsc#930224).\n- Btrfs: fix inode eviction infinite loop after extent_same ioctl (bsc#930224).\n- Btrfs: fix log tree corruption when fs mounted with -o discard (bsc#927116).\n- Btrfs: fix up bounds checking in lseek (bsc#927115).\n- Fix rtworkqueues crash. Calling __sched_setscheduler() in interrupt context is forbidden, and destroy_worker() did so in the timer interrupt with a nohz_full config. Preclude that possibility for both boot options.\n- Input: psmouse - add psmouse_matches_pnp_id helper function (bsc#929092).\n- Input: synaptics - fix middle button on Lenovo 2015 products (bsc#929092).\n- Input: synaptics - handle spurious release of trackstick buttons (bsc#929092).\n- Input: synaptics - re-route tracksticks buttons on the Lenovo 2015 series (bsc#929092).\n- Input: synaptics - remove TOPBUTTONPAD property for Lenovos 2015 (bsc#929092).\n- Input: synaptics - retrieve the extended capabilities in query $10 (bsc#929092).\n- NFS: Add attribute update barriers to nfs_setattr_update_inode() (bsc#920262).\n- NFS: restore kabi after change to nfs_setattr_update_inode (bsc#920262).\n- af_iucv: fix AF_IUCV sendmsg() errno (bsc#927308, LTC#123304).\n- audit: do not reject all AUDIT_INODE filter types (bsc#927455).\n- bnx2x: Fix kdump when iommu=on (bsc#921769).\n- cpufreq: fix a NULL pointer dereference in __cpufreq_governor() (bsc#924664).\n- dasd: Fix device having no paths after suspend/resume (bsc#927308, LTC#123896).\n- dasd: Fix inability to set a DASD device offline (bsc#927308, LTC#123905).\n- dasd: Fix unresumed device after suspend/resume (bsc#927308, LTC#123892).\n- dasd: Missing partition after online processing (bsc#917125, LTC#120565).\n- drm/radeon/cik: Add macrotile mode array query (bsc#927285).\n- drm/radeon: fix display tiling setup on SI (bsc#927285).\n- drm/radeon: set correct number of banks for CIK chips in DCE (bsc#927285).\n- iommu/amd: Correctly encode huge pages in iommu page tables (bsc#931014).\n- iommu/amd: Optimize alloc_new_range for new fetch_pte interface (bsc#931014).\n- iommu/amd: Optimize amd_iommu_iova_to_phys for new fetch_pte interface (bsc#931014).\n- iommu/amd: Optimize iommu_unmap_page for new fetch_pte interface (bsc#931014).\n- iommu/amd: Return the pte page-size in fetch_pte (bsc#931014).\n- ipc/shm.c: fix overly aggressive shmdt() when calls span multiple segments (ipc fixes).\n- ipmi: Turn off all activity on an idle ipmi interface (bsc#915540).\n- ixgbe: fix detection of SFP+ capable interfaces (bsc#922734).\n- kgr: add error code to the message in kgr_revert_replaced_funs.\n- kgr: add kgraft annotations to kthreads wait_event_freezable() API calls.\n- kgr: correct error handling of the first patching stage.\n- kgr: handle the delayed patching of the modules.\n- kgr: handle the failure of finalization stage.\n- kgr: return error in kgr_init if notifier registration fails.\n- kgr: take switching of the fops out of kgr_patch_code to new function.\n- kgr: use for_each_process_thread (bsc#929883).\n- kgr: use kgr_in_progress for all threads (bnc#929883).\n- libata: Blacklist queued TRIM on Samsung SSD 850 Pro (bsc#926156).\n- mlx4: Call dev_kfree_skby_any instead of dev_kfree_skb (bsc#928708).\n- mm, numa: really disable NUMA balancing by default on single node machines (Automatic NUMA Balancing).\n- mm: vmscan: do not throttle based on pfmemalloc reserves if node has no reclaimable pages (bsc#924803, VM Functionality).\n- net/mlx4: Cache line CQE/EQE stride fixes (bsc#927084).\n- net/mlx4_core: Cache line EQE size support (bsc#927084).\n- net/mlx4_core: Enable CQE/EQE stride support (bsc#927084).\n- net/mlx4_en: Add mlx4_en_get_cqe helper (bsc#927084).\n- perf/x86/amd/ibs: Update IBS MSRs and feature definitions.\n- powerpc/mm: Fix mmap errno when MAP_FIXED is set and mapping exceeds the allowed address space (bsc#930669).\n- powerpc/numa: Add ability to disable and debug topology updates (bsc#924809).\n- powerpc/numa: Enable CONFIG_HAVE_MEMORYLESS_NODES (bsc#924809).\n- powerpc/numa: Enable USE_PERCPU_NUMA_NODE_ID (bsc#924809).\n- powerpc/numa: check error return from proc_create (bsc#924809).\n- powerpc/numa: ensure per-cpu NUMA mappings are correct on topology update (bsc#924809).\n- powerpc/numa: use cached value of update-\u0026gt;cpu in update_cpu_topology (bsc#924809).\n- powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH (bsc#928141).\n- powerpc/pseries: Introduce api_version to migration sysfs interface (bsc#926314).\n- powerpc/pseries: Little endian fixes for post mobility device tree update (bsc#926314).\n- powerpc/pseries: Simplify check for suspendability during suspend/migration (bsc#926314).\n- powerpc: Fix sys_call_table declaration to enable syscall tracing.\n- powerpc: Fix warning reported by verify_cpu_node_mapping() (bsc#924809).\n- powerpc: Only set numa node information for present cpus at boottime (bsc#924809).\n- powerpc: reorder per-cpu NUMA information initialization (bsc#924809).\n- powerpc: some changes in numa_setup_cpu() (bsc#924809).\n- quota: Fix use of units in quota getting / setting interfaces (bsc#913232).\n- rpm/kernel-binary.spec.in: Fix build if there is no *.crt file\n- rpm/kernel-obs-qa.spec.in: Do not fail if the kernel versions do not match\n- s390/bpf: Fix ALU_NEG (A = -A) (bsc#917125, LTC#121759).\n- s390/bpf: Fix JMP_JGE_K (A \u003e= K) and JMP_JGT_K (A \u003e K) (bsc#917125, LTC#121759).\n- s390/bpf: Fix JMP_JGE_X (A \u003e X) and JMP_JGT_X (A \u003e= X) (bsc#917125, LTC#121759).\n- s390/bpf: Fix offset parameter for skb_copy_bits() (bsc#917125, LTC#121759).\n- s390/bpf: Fix sk_load_byte_msh() (bsc#917125, LTC#121759).\n- s390/bpf: Fix skb_copy_bits() parameter passing (bsc#917125, LTC#121759).\n- s390/bpf: Zero extend parameters before calling C function (bsc#917125, LTC#121759).\n- s390/sclp: Consolidate early sclp init calls to sclp_early_detect() (bsc#917125, LTC#122429).\n- s390/sclp: Determine HSA size dynamically for zfcpdump (bsc#917125, LTC#122429).\n- s390/sclp: Move declarations for sclp_sdias into separate header file (bsc#917125, LTC#122429).\n- s390/sclp: Move early code from sclp_cmd.c to sclp_early.c (bsc#917125, LTC#122429).\n- s390/sclp: replace uninitialized early_event_mask_sccb variable with sccb_early (bsc#917125, LTC#122429).\n- s390/sclp: revert smp-detect-possible-cpus.patch (bsc#917125, LTC#122429).\n- s390/sclp_early: Add function to detect sclp console capabilities (bsc#917125, LTC#122429).\n- s390/sclp_early: Get rid of sclp_early_read_info_sccb_valid (bsc#917125, LTC#122429).\n- s390/sclp_early: Pass sccb pointer to every *_detect() function (bsc#917125, LTC#122429).\n- s390/sclp_early: Replace early_read_info_sccb with sccb_early (bsc#917125, LTC#122429).\n- s390/sclp_early: Return correct HSA block count also for zero (bsc#917125, LTC#122429).\n- s390/smp: limit number of cpus in possible cpu mask (bsc#917125, LTC#122429).\n- s390: kgr, change the kgraft state only if enabled.\n- sched, time: Fix lock inversion in thread_group_cputime()\n- sched: Fix potential near-infinite distribute_cfs_runtime() loop (bsc#930786)\n- sched: Robustify topology setup (bsc#924809).\n- seqlock: Add irqsave variant of read_seqbegin_or_lock() (Time scalability).\n- storvsc: Set the SRB flags correctly when no data transfer is needed (bsc#931130).\n- x86/apic/uv: Update the APIC UV OEM check (bsc#929145).\n- x86/apic/uv: Update the UV APIC HUB check (bsc#929145).\n- x86/apic/uv: Update the UV APIC driver check (bsc#929145).\n- x86/microcode/intel: Guard against stack overflow in the loader (bsc#922944).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-269,SUSE-SLE-Live-Patching-12-2015-269,SUSE-SLE-Module-Public-Cloud-12-2015-269,SUSE-SLE-SDK-12-2015-269,SUSE-SLE-SERVER-12-2015-269,SUSE-SLE-WE-12-2015-269", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1071-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1071-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151071-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1071-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" }, { "category": "self", "summary": "SUSE Bug 899192", "url": "https://bugzilla.suse.com/899192" }, { "category": "self", "summary": "SUSE Bug 900881", "url": "https://bugzilla.suse.com/900881" }, { "category": "self", "summary": "SUSE Bug 909312", "url": "https://bugzilla.suse.com/909312" }, { "category": "self", "summary": "SUSE Bug 913232", "url": "https://bugzilla.suse.com/913232" }, { "category": "self", "summary": "SUSE Bug 914742", "url": "https://bugzilla.suse.com/914742" }, { "category": "self", "summary": "SUSE Bug 915540", "url": "https://bugzilla.suse.com/915540" }, { "category": "self", "summary": "SUSE Bug 916225", "url": "https://bugzilla.suse.com/916225" }, { "category": "self", "summary": "SUSE Bug 917125", "url": "https://bugzilla.suse.com/917125" }, { "category": "self", "summary": "SUSE Bug 919007", "url": "https://bugzilla.suse.com/919007" }, { "category": "self", "summary": "SUSE Bug 919018", "url": "https://bugzilla.suse.com/919018" }, { "category": "self", "summary": "SUSE Bug 920262", "url": "https://bugzilla.suse.com/920262" }, { "category": "self", "summary": "SUSE Bug 921769", "url": "https://bugzilla.suse.com/921769" }, { "category": "self", "summary": "SUSE Bug 922583", "url": "https://bugzilla.suse.com/922583" }, { "category": "self", "summary": "SUSE Bug 922734", "url": "https://bugzilla.suse.com/922734" }, { "category": "self", "summary": "SUSE Bug 922944", "url": "https://bugzilla.suse.com/922944" }, { "category": "self", "summary": "SUSE Bug 924664", "url": "https://bugzilla.suse.com/924664" }, { "category": "self", "summary": "SUSE Bug 924803", "url": "https://bugzilla.suse.com/924803" }, { "category": "self", "summary": "SUSE Bug 924809", "url": "https://bugzilla.suse.com/924809" }, { "category": "self", "summary": "SUSE Bug 925567", "url": "https://bugzilla.suse.com/925567" }, { "category": "self", "summary": "SUSE Bug 926156", "url": "https://bugzilla.suse.com/926156" }, { "category": "self", "summary": "SUSE Bug 926240", "url": "https://bugzilla.suse.com/926240" }, { "category": "self", "summary": "SUSE Bug 926314", "url": "https://bugzilla.suse.com/926314" }, { "category": "self", "summary": "SUSE Bug 927084", "url": "https://bugzilla.suse.com/927084" }, { "category": "self", "summary": "SUSE Bug 927115", "url": "https://bugzilla.suse.com/927115" }, { "category": "self", "summary": "SUSE Bug 927116", "url": "https://bugzilla.suse.com/927116" }, { "category": "self", "summary": "SUSE Bug 927257", "url": "https://bugzilla.suse.com/927257" }, { "category": "self", "summary": "SUSE Bug 927285", "url": "https://bugzilla.suse.com/927285" }, { "category": "self", "summary": "SUSE Bug 927308", "url": "https://bugzilla.suse.com/927308" }, { "category": "self", "summary": "SUSE Bug 927455", "url": "https://bugzilla.suse.com/927455" }, { "category": "self", "summary": "SUSE Bug 928122", "url": "https://bugzilla.suse.com/928122" }, { "category": "self", "summary": "SUSE Bug 928130", "url": "https://bugzilla.suse.com/928130" }, { "category": "self", "summary": "SUSE Bug 928135", "url": "https://bugzilla.suse.com/928135" }, { "category": "self", "summary": "SUSE Bug 928141", "url": "https://bugzilla.suse.com/928141" }, { "category": "self", "summary": "SUSE Bug 928708", "url": "https://bugzilla.suse.com/928708" }, { "category": "self", "summary": "SUSE Bug 929092", "url": "https://bugzilla.suse.com/929092" }, { "category": "self", "summary": "SUSE Bug 929145", "url": "https://bugzilla.suse.com/929145" }, { "category": "self", "summary": "SUSE Bug 929525", "url": "https://bugzilla.suse.com/929525" }, { "category": "self", "summary": "SUSE Bug 929883", "url": "https://bugzilla.suse.com/929883" }, { "category": "self", "summary": "SUSE Bug 930224", "url": "https://bugzilla.suse.com/930224" }, { "category": "self", "summary": "SUSE Bug 930226", "url": "https://bugzilla.suse.com/930226" }, { "category": "self", "summary": "SUSE Bug 930669", "url": "https://bugzilla.suse.com/930669" }, { "category": "self", "summary": "SUSE Bug 930786", "url": "https://bugzilla.suse.com/930786" }, { "category": "self", "summary": "SUSE Bug 931014", "url": "https://bugzilla.suse.com/931014" }, { "category": "self", "summary": "SUSE Bug 931130", "url": "https://bugzilla.suse.com/931130" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3647 page", "url": "https://www.suse.com/security/cve/CVE-2014-3647/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8086 page", "url": "https://www.suse.com/security/cve/CVE-2014-8086/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8159 page", "url": "https://www.suse.com/security/cve/CVE-2014-8159/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1465 page", "url": "https://www.suse.com/security/cve/CVE-2015-1465/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2041 page", "url": "https://www.suse.com/security/cve/CVE-2015-2041/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2042 page", "url": "https://www.suse.com/security/cve/CVE-2015-2042/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2666 page", "url": "https://www.suse.com/security/cve/CVE-2015-2666/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2830 page", "url": "https://www.suse.com/security/cve/CVE-2015-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2922 page", "url": "https://www.suse.com/security/cve/CVE-2015-2922/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3331 page", "url": "https://www.suse.com/security/cve/CVE-2015-3331/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3332 page", "url": "https://www.suse.com/security/cve/CVE-2015-3332/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3339 page", "url": "https://www.suse.com/security/cve/CVE-2015-3339/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3636 page", "url": "https://www.suse.com/security/cve/CVE-2015-3636/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2015-06-11T16:05:11Z", "generator": { "date": "2015-06-11T16:05:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1071-1", "initial_release_date": "2015-06-11T16:05:11Z", "revision_history": [ { "date": "2015-06-11T16:05:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.43-52.6.1.noarch", "product": { "name": "kernel-devel-3.12.43-52.6.1.noarch", "product_id": "kernel-devel-3.12.43-52.6.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.43-52.6.1.noarch", "product": { "name": "kernel-macros-3.12.43-52.6.1.noarch", "product_id": "kernel-macros-3.12.43-52.6.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.43-52.6.1.noarch", "product": { "name": "kernel-source-3.12.43-52.6.1.noarch", "product_id": "kernel-source-3.12.43-52.6.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.43-52.6.2.noarch", "product": { "name": "kernel-docs-3.12.43-52.6.2.noarch", "product_id": "kernel-docs-3.12.43-52.6.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.43-52.6.2.ppc64le", "product": { "name": "kernel-obs-build-3.12.43-52.6.2.ppc64le", "product_id": "kernel-obs-build-3.12.43-52.6.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.43-52.6.1.ppc64le", "product": { "name": "kernel-default-3.12.43-52.6.1.ppc64le", "product_id": "kernel-default-3.12.43-52.6.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.43-52.6.1.ppc64le", "product": { "name": "kernel-default-base-3.12.43-52.6.1.ppc64le", "product_id": "kernel-default-base-3.12.43-52.6.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.43-52.6.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.43-52.6.1.ppc64le", "product_id": "kernel-default-devel-3.12.43-52.6.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.43-52.6.1.ppc64le", "product": { "name": "kernel-syms-3.12.43-52.6.1.ppc64le", "product_id": "kernel-syms-3.12.43-52.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.43-52.6.2.s390x", "product": { "name": "kernel-obs-build-3.12.43-52.6.2.s390x", "product_id": "kernel-obs-build-3.12.43-52.6.2.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.43-52.6.1.s390x", "product": { "name": "kernel-default-3.12.43-52.6.1.s390x", "product_id": "kernel-default-3.12.43-52.6.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.43-52.6.1.s390x", "product": { "name": "kernel-default-base-3.12.43-52.6.1.s390x", "product_id": "kernel-default-base-3.12.43-52.6.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.43-52.6.1.s390x", "product": { "name": "kernel-default-devel-3.12.43-52.6.1.s390x", "product_id": "kernel-default-devel-3.12.43-52.6.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.43-52.6.1.s390x", "product": { "name": "kernel-default-man-3.12.43-52.6.1.s390x", "product_id": "kernel-default-man-3.12.43-52.6.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.43-52.6.1.s390x", "product": { "name": "kernel-syms-3.12.43-52.6.1.s390x", "product_id": "kernel-syms-3.12.43-52.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-default-3.12.43-52.6.1.x86_64", "product_id": "kernel-default-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-default-devel-3.12.43-52.6.1.x86_64", "product_id": "kernel-default-devel-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-default-extra-3.12.43-52.6.1.x86_64", "product_id": "kernel-default-extra-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-syms-3.12.43-52.6.1.x86_64", "product_id": "kernel-syms-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-xen-3.12.43-52.6.1.x86_64", "product_id": "kernel-xen-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.43-52.6.1.x86_64", "product_id": "kernel-xen-devel-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "product_id": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "product_id": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-ec2-3.12.43-52.6.1.x86_64", "product_id": "kernel-ec2-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.43-52.6.1.x86_64", "product_id": "kernel-ec2-devel-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.43-52.6.1.x86_64", "product_id": "kernel-ec2-extra-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.43-52.6.2.x86_64", "product": { "name": "kernel-obs-build-3.12.43-52.6.2.x86_64", "product_id": "kernel-obs-build-3.12.43-52.6.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-default-base-3.12.43-52.6.1.x86_64", "product_id": "kernel-default-base-3.12.43-52.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.43-52.6.1.x86_64", "product": { "name": "kernel-xen-base-3.12.43-52.6.1.x86_64", "product_id": "kernel-xen-base-3.12.43-52.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch" }, "product_reference": "kernel-devel-3.12.43-52.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch" }, "product_reference": "kernel-macros-3.12.43-52.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch" }, "product_reference": "kernel-source-3.12.43-52.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-syms-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-xen-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-ec2-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.43-52.6.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch" }, "product_reference": "kernel-docs-3.12.43-52.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.43-52.6.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le" }, "product_reference": "kernel-obs-build-3.12.43-52.6.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.43-52.6.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x" }, "product_reference": "kernel-obs-build-3.12.43-52.6.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.43-52.6.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64" }, "product_reference": "kernel-obs-build-3.12.43-52.6.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le" }, "product_reference": "kernel-default-3.12.43-52.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-default-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.43-52.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-default-base-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-base-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.43-52.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-default-devel-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-default-man-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch" }, "product_reference": "kernel-devel-3.12.43-52.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch" }, "product_reference": "kernel-macros-3.12.43-52.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch" }, "product_reference": "kernel-source-3.12.43-52.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le" }, "product_reference": "kernel-syms-3.12.43-52.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-syms-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-syms-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-xen-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le" }, "product_reference": "kernel-default-3.12.43-52.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-default-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.43-52.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-default-base-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-base-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.43-52.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-default-devel-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-default-man-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch" }, "product_reference": "kernel-devel-3.12.43-52.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch" }, "product_reference": "kernel-macros-3.12.43-52.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.43-52.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch" }, "product_reference": "kernel-source-3.12.43-52.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.43-52.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le" }, "product_reference": "kernel-syms-3.12.43-52.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.43-52.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x" }, "product_reference": "kernel-syms-3.12.43-52.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-syms-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-xen-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.43-52.6.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.43-52.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3647" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3647", "url": "https://www.suse.com/security/cve/CVE-2014-3647" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2014-3647", "url": "https://bugzilla.suse.com/1013038" }, { "category": "external", "summary": "SUSE Bug 1134834 for CVE-2014-3647", "url": "https://bugzilla.suse.com/1134834" }, { "category": "external", "summary": "SUSE Bug 899192 for CVE-2014-3647", "url": "https://bugzilla.suse.com/899192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2014-3647" }, { "cve": "CVE-2014-8086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8086" } ], "notes": [ { "category": "general", "text": "Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8086", "url": "https://www.suse.com/security/cve/CVE-2014-8086" }, { "category": "external", "summary": "SUSE Bug 900881 for CVE-2014-8086", "url": "https://bugzilla.suse.com/900881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2014-8086" }, { "cve": "CVE-2014-8159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8159" } ], "notes": [ { "category": "general", "text": "The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8159", "url": "https://www.suse.com/security/cve/CVE-2014-8159" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2014-8159", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 914742 for CVE-2014-8159", "url": "https://bugzilla.suse.com/914742" }, { "category": "external", "summary": "SUSE Bug 939241 for CVE-2014-8159", "url": "https://bugzilla.suse.com/939241" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2014-8159" }, { "cve": "CVE-2015-1465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1465" } ], "notes": [ { "category": "general", "text": "The IPv4 implementation in the Linux kernel before 3.18.8 does not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allows remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1465", "url": "https://www.suse.com/security/cve/CVE-2015-1465" }, { "category": "external", "summary": "SUSE Bug 916225 for CVE-2015-1465", "url": "https://bugzilla.suse.com/916225" }, { "category": "external", "summary": "SUSE Bug 939044 for CVE-2015-1465", "url": "https://bugzilla.suse.com/939044" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "important" } ], "title": "CVE-2015-1465" }, { "cve": "CVE-2015-2041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2041" } ], "notes": [ { "category": "general", "text": "net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2041", "url": "https://www.suse.com/security/cve/CVE-2015-2041" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2041", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 919007 for CVE-2015-2041", "url": "https://bugzilla.suse.com/919007" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2015-2041" }, { "cve": "CVE-2015-2042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2042" } ], "notes": [ { "category": "general", "text": "net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2042", "url": "https://www.suse.com/security/cve/CVE-2015-2042" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2042", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 919018 for CVE-2015-2042", "url": "https://bugzilla.suse.com/919018" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2015-2042" }, { "cve": "CVE-2015-2666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2666" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2666", "url": "https://www.suse.com/security/cve/CVE-2015-2666" }, { "category": "external", "summary": "SUSE Bug 922944 for CVE-2015-2666", "url": "https://bugzilla.suse.com/922944" }, { "category": "external", "summary": "SUSE Bug 939044 for CVE-2015-2666", "url": "https://bugzilla.suse.com/939044" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2015-2666" }, { "cve": "CVE-2015-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2830" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2830", "url": "https://www.suse.com/security/cve/CVE-2015-2830" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2830", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 926240 for CVE-2015-2830", "url": "https://bugzilla.suse.com/926240" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2015-2830" }, { "cve": "CVE-2015-2922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2922" } ], "notes": [ { "category": "general", "text": "The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2922", "url": "https://www.suse.com/security/cve/CVE-2015-2922" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-2922", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 922583 for CVE-2015-2922", "url": "https://bugzilla.suse.com/922583" }, { "category": "external", "summary": "SUSE Bug 926223 for CVE-2015-2922", "url": "https://bugzilla.suse.com/926223" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2015-2922" }, { "cve": "CVE-2015-3331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3331" } ], "notes": [ { "category": "general", "text": "The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3331", "url": "https://www.suse.com/security/cve/CVE-2015-3331" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-3331", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 927257 for CVE-2015-3331", "url": "https://bugzilla.suse.com/927257" }, { "category": "external", "summary": "SUSE Bug 931231 for CVE-2015-3331", "url": "https://bugzilla.suse.com/931231" }, { "category": "external", "summary": "SUSE Bug 939262 for CVE-2015-3331", "url": "https://bugzilla.suse.com/939262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2015-3331" }, { "cve": "CVE-2015-3332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3332" } ], "notes": [ { "category": "general", "text": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3332", "url": "https://www.suse.com/security/cve/CVE-2015-3332" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-3332", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 928135 for CVE-2015-3332", "url": "https://bugzilla.suse.com/928135" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-3332", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2015-3332" }, { "cve": "CVE-2015-3339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3339" } ], "notes": [ { "category": "general", "text": "Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3339", "url": "https://www.suse.com/security/cve/CVE-2015-3339" }, { "category": "external", "summary": "SUSE Bug 903967 for CVE-2015-3339", "url": "https://bugzilla.suse.com/903967" }, { "category": "external", "summary": "SUSE Bug 928130 for CVE-2015-3339", "url": "https://bugzilla.suse.com/928130" }, { "category": "external", "summary": "SUSE Bug 939263 for CVE-2015-3339", "url": "https://bugzilla.suse.com/939263" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2015-3339" }, { "cve": "CVE-2015-3636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3636" } ], "notes": [ { "category": "general", "text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3636", "url": "https://www.suse.com/security/cve/CVE-2015-3636" }, { "category": "external", "summary": "SUSE Bug 929525 for CVE-2015-3636", "url": "https://bugzilla.suse.com/929525" }, { "category": "external", "summary": "SUSE Bug 939277 for CVE-2015-3636", "url": "https://bugzilla.suse.com/939277" }, { "category": "external", "summary": "SUSE Bug 994624 for CVE-2015-3636", "url": "https://bugzilla.suse.com/994624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_43-52_6-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.43-52.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.43-52.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.43-52.6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.43-52.6.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.43-52.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-11T16:05:11Z", "details": "moderate" } ], "title": "CVE-2015-3636" } ] }
fkie_cve-2015-3332
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | * | |
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C8919F1-CD33-437E-9627-69352B276BA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D096AE24-5BB5-4ED2-8D2B-DC2AE8012E40", "versionEndIncluding": "3.17.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds." }, { "lang": "es", "value": "Cierto backport en la implementaci\u00f3n TCP Fast Open para el kernel de Linux anterior a 3.18 no mantiene correctamente un valor de contador, lo que permite a usuarios locales causar una denegaci\u00f3n de servicio (ca\u00edda de sistema) a trav\u00e9s de la caracter\u00edstica Fast Open, tal y como fue demostrado mediante la visita a la URL chrome://flags/#enable-tcp-fast-open cuando utiliza ciertos builds del kernel 3.10.x hasta 3.16.x, incluyendo lanzamientos de mantenimiento a largo plazo y builds ckt (tambi\u00e9n conocidos como Canonical Kernel Team)." } ], "id": "CVE-2015-3332", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-05-27T10:59:08.860", "references": [ { "source": "cve@mitre.org", "url": "http://article.gmane.org/gmane.linux.network/359588" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3237" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/04/14/14" }, { "source": "cve@mitre.org", "url": "https://bugs.debian.org/782515" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://article.gmane.org/gmane.linux.network/359588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/04/14/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.debian.org/782515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2015-3332
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-3332", "description": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.", "id": "GSD-2015-3332", "references": [ "https://www.suse.com/security/cve/CVE-2015-3332.html", "https://www.debian.org/security/2015/dsa-3237", "https://ubuntu.com/security/CVE-2015-3332", "https://advisories.mageia.org/CVE-2015-3332.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-3332" ], "details": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.", "id": "GSD-2015-3332", "modified": "2023-12-13T01:20:07.048894Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/14/14" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951" }, { "name": "DSA-3237", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3237" }, { "name": "https://bugs.debian.org/782515", "refsource": "CONFIRM", "url": "https://bugs.debian.org/782515" }, { "name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly", "refsource": "MLIST", "url": "http://article.gmane.org/gmane.linux.network/359588" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.17.8", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3332" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.debian.org/782515", "refsource": "CONFIRM", "tags": [], "url": "https://bugs.debian.org/782515" }, { "name": "[netdev] 20150414 [stable regression] tcp: make connect() mem charging friendly", "refsource": "MLIST", "tags": [], "url": "http://article.gmane.org/gmane.linux.network/359588" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951" }, { "name": "[oss-security] 20150414 TCP Fast Open local DoS in some Linux stable branches", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2015/04/14/14" }, { "name": "DSA-3237", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2015/dsa-3237" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2016-04-11T18:54Z", "publishedDate": "2015-05-27T10:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.