Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-4036 (GCVE-0-2015-4036)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:04:02.583Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "USN-2634-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2634-1"
},
{
"name": "74664",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/74664"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"name": "SUSE-SU-2015:1324",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
},
{
"name": "openSUSE-SU-2015:1382",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"name": "[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2015/05/13/4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864"
},
{
"name": "USN-2633-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2633-1"
},
{
"name": "1033729",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1033729"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-05-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-20T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "USN-2634-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2634-1"
},
{
"name": "74664",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/74664"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"name": "SUSE-SU-2015:1324",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
},
{
"name": "openSUSE-SU-2015:1382",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"name": "[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2015/05/13/4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864"
},
{
"name": "USN-2633-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2633-1"
},
{
"name": "1033729",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1033729"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-4036",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-2634-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2634-1"
},
{
"name": "74664",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74664"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"name": "SUSE-SU-2015:1324",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
},
{
"name": "openSUSE-SU-2015:1382",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"name": "[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/05/13/4"
},
{
"name": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864"
},
{
"name": "USN-2633-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2633-1"
},
{
"name": "1033729",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033729"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-4036",
"datePublished": "2015-08-31T20:00:00",
"dateReserved": "2015-05-19T00:00:00",
"dateUpdated": "2024-08-06T06:04:02.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2015-4036\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-08-31T20:59:01.653\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de error de \u00edndice de Array en la funci\u00f3n tcm_vhost_make_tpg en drivers/vhost/scsi.c en el kernel de Linux en versiones anteriores a 4.0, puede permitir a usuarios invitados del SO causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente tener otro impacto no especificado a trav\u00e9s de una llamada ioctl VHOST_SCSI_SET_ENDPOINT manipulada. NOTA: la funci\u00f3n afectada fue renombrada como vhost_scsi_make_tpg antes del anuncio de la vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartExcluding\":\"3.6\",\"versionEndExcluding\":\"3.10.90\",\"matchCriteriaId\":\"D3255027-0A48-43E5-9E50-89A18E256E98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.11\",\"versionEndExcluding\":\"3.12.44\",\"matchCriteriaId\":\"8D0C4C2A-444F-4959-BBA9-AEBD29C2CA7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.13\",\"versionEndExcluding\":\"3.14.57\",\"matchCriteriaId\":\"8A11EA50-ADF8-4F55-975C-C7DB23C9B455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.15\",\"versionEndExcluding\":\"3.16.35\",\"matchCriteriaId\":\"7DC4BA70-B111-4D2E-BC78-6601CED68F08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"3.18.25\",\"matchCriteriaId\":\"1CE06EBF-9588-4C87-A85F-8224C668D218\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.19\",\"versionEndExcluding\":\"4.0\",\"matchCriteriaId\":\"8A7FC79A-26B7-4E34-BB99-D25E74514239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7D72FF4-3906-4585-B39A-A9B194F53204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"61B347F1-DB7C-4078-AED9-BF4906F0DEB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0FCBD80-8462-4642-B2F0-54896776CF07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"42F72762-D825-4B81-93BB-5B7F54313F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"41FDE042-F389-4580-BEBB-EBAB4F562477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"329C7DD0-9CEA-4D15-B0FE-B3565EE53A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6067C5D-29B3-4EE2-BDCA-3F204F25F1C0\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/05/13/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/74664\",\"source\":\"cve@mitre.org\",\"tags\":[\"VDB Entry\",\"URL Repurposed\"]},{\"url\":\"http://www.securitytracker.com/id/1033729\",\"source\":\"cve@mitre.org\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2633-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2634-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1189864\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/05/13/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/74664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\",\"URL Repurposed\"]},{\"url\":\"http://www.securitytracker.com/id/1033729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2633-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2634-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1189864\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2015-AVI-357
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de OpenSUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
openSUSE 13.2
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eopenSUSE 13.2\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4002"
},
{
"name": "CVE-2015-4692",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4692"
},
{
"name": "CVE-2015-3290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3290"
},
{
"name": "CVE-2015-4036",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4036"
},
{
"name": "CVE-2015-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2922"
},
{
"name": "CVE-2015-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4700"
},
{
"name": "CVE-2015-4001",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4001"
},
{
"name": "CVE-2015-3339",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3339"
},
{
"name": "CVE-2014-9729",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9729"
},
{
"name": "CVE-2015-2041",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2041"
},
{
"name": "CVE-2014-9728",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9728"
},
{
"name": "CVE-2015-4167",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4167"
},
{
"name": "CVE-2014-9730",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9730"
},
{
"name": "CVE-2015-5366",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5366"
},
{
"name": "CVE-2015-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1420"
},
{
"name": "CVE-2015-5364",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5364"
},
{
"name": "CVE-2015-1465",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1465"
},
{
"name": "CVE-2015-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3212"
},
{
"name": "CVE-2014-9731",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9731"
},
{
"name": "CVE-2015-3636",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3636"
},
{
"name": "CVE-2015-4003",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4003"
}
],
"initial_release_date": "2015-08-17T00:00:00",
"last_revision_date": "2015-08-17T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 openSUSE-SU-2015:1382-1 du 14 ao\u00fbt 2015",
"url": "https://lwn.net/Articles/654531/"
}
],
"reference": "CERTFR-2015-AVI-357",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-08-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de OpenSUSE\u003c/span\u003e. Certaines d\u0027entre\nelles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, une ex\u00e9cution de code arbitraire et un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de OpenSUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 openSUSE-SU-2015:1382-1 du 14 ao\u00fbt 2015",
"url": null
}
]
}
CERTFR-2015-AVI-254
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux Ubuntu. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 15.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-4036",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4036"
},
{
"name": "CVE-2015-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2830"
},
{
"name": "CVE-2015-3331",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3331"
},
{
"name": "CVE-2015-4167",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4167"
},
{
"name": "CVE-2015-2150",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2150"
},
{
"name": "CVE-2015-0275",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0275"
},
{
"name": "CVE-2015-3636",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3636"
}
],
"initial_release_date": "2015-06-11T00:00:00",
"last_revision_date": "2015-06-11T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-254",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau Linux \u003cspan\nclass=\"textit\"\u003eUbuntu\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2634-1 du 10 juin 2015",
"url": "http://www.ubuntu.com/usn/usn-2634-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2638-1 du 10 juin 2015",
"url": "http://www.ubuntu.com/usn/usn-2638-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2637-1 du 10 juin 2015",
"url": "http://www.ubuntu.com/usn/usn-2637-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2631-1 du 10 juin 2015",
"url": "http://www.ubuntu.com/usn/usn-2631-1/"
}
]
}
fkie_cve-2015-4036
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c | Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html | Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html | Third Party Advisory | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/05/13/4 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/74664 | VDB Entry, URL Repurposed | |
| cve@mitre.org | http://www.securitytracker.com/id/1033729 | URL Repurposed | |
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2633-1 | Third Party Advisory | |
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2634-1 | Third Party Advisory | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1189864 | Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/05/13/4 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/74664 | VDB Entry, URL Repurposed | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033729 | URL Repurposed | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2633-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2634-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1189864 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 3.6 | |
| linux | linux_kernel | 3.6 | |
| linux | linux_kernel | 3.6 | |
| linux | linux_kernel | 3.6 | |
| linux | linux_kernel | 3.6 | |
| linux | linux_kernel | 3.6 | |
| linux | linux_kernel | 3.6 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3255027-0A48-43E5-9E50-89A18E256E98",
"versionEndExcluding": "3.10.90",
"versionStartExcluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0C4C2A-444F-4959-BBA9-AEBD29C2CA7E",
"versionEndExcluding": "3.12.44",
"versionStartIncluding": "3.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A11EA50-ADF8-4F55-975C-C7DB23C9B455",
"versionEndExcluding": "3.14.57",
"versionStartIncluding": "3.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC4BA70-B111-4D2E-BC78-6601CED68F08",
"versionEndExcluding": "3.16.35",
"versionStartIncluding": "3.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE06EBF-9588-4C87-A85F-8224C668D218",
"versionEndExcluding": "3.18.25",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A7FC79A-26B7-4E34-BB99-D25E74514239",
"versionEndExcluding": "4.0",
"versionStartIncluding": "3.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*",
"matchCriteriaId": "E7D72FF4-3906-4585-B39A-A9B194F53204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "61B347F1-DB7C-4078-AED9-BF4906F0DEB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0FCBD80-8462-4642-B2F0-54896776CF07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "42F72762-D825-4B81-93BB-5B7F54313F46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "41FDE042-F389-4580-BEBB-EBAB4F562477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*",
"matchCriteriaId": "329C7DD0-9CEA-4D15-B0FE-B3565EE53A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*",
"matchCriteriaId": "A6067C5D-29B3-4EE2-BDCA-3F204F25F1C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced."
},
{
"lang": "es",
"value": "Vulnerabilidad de error de \u00edndice de Array en la funci\u00f3n tcm_vhost_make_tpg en drivers/vhost/scsi.c en el kernel de Linux en versiones anteriores a 4.0, puede permitir a usuarios invitados del SO causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente tener otro impacto no especificado a trav\u00e9s de una llamada ioctl VHOST_SCSI_SET_ENDPOINT manipulada. NOTA: la funci\u00f3n afectada fue renombrada como vhost_scsi_make_tpg antes del anuncio de la vulnerabilidad."
}
],
"id": "CVE-2015-4036",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-08-31T20:59:01.653",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2015/05/13/4"
},
{
"source": "cve@mitre.org",
"tags": [
"VDB Entry",
"URL Repurposed"
],
"url": "http://www.securityfocus.com/bid/74664"
},
{
"source": "cve@mitre.org",
"tags": [
"URL Repurposed"
],
"url": "http://www.securitytracker.com/id/1033729"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2633-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2634-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2015/05/13/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry",
"URL Repurposed"
],
"url": "http://www.securityfocus.com/bid/74664"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"URL Repurposed"
],
"url": "http://www.securitytracker.com/id/1033729"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2633-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2634-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-f533-g6c5-65cx
Vulnerability from github
Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.
{
"affected": [],
"aliases": [
"CVE-2015-4036"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-08-31T20:59:00Z",
"severity": "HIGH"
},
"details": "Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.",
"id": "GHSA-f533-g6c5-65cx",
"modified": "2022-05-17T03:20:08Z",
"published": "2022-05-17T03:20:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4036"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864"
},
{
"type": "WEB",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2015/05/13/4"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/74664"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1033729"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2633-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2634-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
suse-su-2015:1324-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the SUSE Linux Enterprise 12 kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 kernel was updated to 3.12.44 to receive various security and bugfixes.\n\nThese features were added:\n- mpt2sas: Added Reply Descriptor Post Queue (RDPQ) Array support (bsc#854824).\n- mpt3sas: Bump mpt3sas driver version to 04.100.00.00 (bsc#854817).\n\nFollowing security bugs were fixed:\n- CVE-2015-1805: iov overrun for failed atomic copy could have lead to\n DoS or privilege escalation (bsc#933429).\n- CVE-2015-3212: A race condition in the way the Linux kernel handled\n lists of associations in SCTP sockets could have lead to list\n corruption and kernel panics (bsc#936502).\n- CVE-2015-4036: DoS via memory corruption in vhost/scsi driver\n (bsc#931988).\n- CVE-2015-4167: Linux kernel built with the UDF file\n system(CONFIG_UDF_FS) support was vulnerable to a crash. It occurred\n while fetching inode information from a corrupted/malicious udf file\n system image (bsc#933907).\n- CVE-2015-4692: DoS via NULL pointer dereference in kvm_apic_has_events\n function (bsc#935542).\n- CVE-2015-5364: Remote DoS via flood of UDP packets with invalid\n checksums (bsc#936831).\n- CVE-2015-5366: Remote DoS of EPOLLET epoll applications via flood of\n UDP packets with invalid checksums (bsc#936831).\n\nSecurity issues already fixed in the previous update but not referenced by CVE:\n- CVE-2014-9728: Kernel built with the UDF file system(CONFIG_UDF_FS)\n support were vulnerable to a crash (bsc#933904).\n- CVE-2014-9729: Kernel built with the UDF file system(CONFIG_UDF_FS)\n support were vulnerable to a crash (bsc#933904).\n- CVE-2014-9730: Kernel built with the UDF file system(CONFIG_UDF_FS)\n support were vulnerable to a crash (bsc#933904).\n- CVE-2014-9731: Kernel built with the UDF file system(CONFIG_UDF_FS)\n support were vulnerable to information leakage (bsc#933896).\n\nThe following non-security bugs were fixed:\n- ALSA: hda - add codec ID for Skylake display audio codec (bsc#936556).\n- ALSA: hda/hdmi - apply Haswell fix-ups to Skylake display codec\n (bsc#936556).\n- ALSA: hda_controller: Separate stream_tag for input and output streams\n (bsc#936556).\n- ALSA: hda_intel: add AZX_DCAPS_I915_POWERWELL for SKL and BSW\n (bsc#936556).\n- ALSA: hda_intel: apply the Seperate stream_tag for Skylake\n (bsc#936556).\n- ALSA: hda_intel: apply the Seperate stream_tag for Sunrise Point\n (bsc#936556).\n- Btrfs: Handle unaligned length in extent_same (bsc#937609).\n- Btrfs: add missing inode item update in fallocate() (bsc#938023).\n- Btrfs: check pending chunks when shrinking fs to avoid corruption\n (bsc#936445).\n- Btrfs: do not update mtime/ctime on deduped inodes (bsc#937616).\n- Btrfs: fix block group -\u003espace_info null pointer dereference\n (bsc#935088).\n- Btrfs: fix clone / extent-same deadlocks (bsc#937612).\n- Btrfs: fix deadlock with extent-same and readpage (bsc#937612).\n- Btrfs: fix fsync data loss after append write (bsc#936446).\n- Btrfs: fix hang during inode eviction due to concurrent readahead\n (bsc#935085).\n- Btrfs: fix memory leak in the extent_same ioctl (bsc#937613).\n- Btrfs: fix race when reusing stale extent buffers that leads to BUG_ON\n (bsc#926369).\n- Btrfs: fix use after free when close_ctree frees the orphan_rsv\n (bsc#938022).\n- Btrfs: pass unaligned length to btrfs_cmp_data() (bsc#937609).\n- Btrfs: provide super_operations-\u003einode_get_dev (bsc#927455).\n- Drivers: hv: balloon: check if ha_region_mutex was acquired in\n MEM_CANCEL_ONLINE case.\n- Drivers: hv: fcopy: process deferred messages when we complete the\n transaction.\n- Drivers: hv: fcopy: rename fcopy_work -\u003e fcopy_timeout_work.\n- Drivers: hv: fcopy: set .owner reference for file operations.\n- Drivers: hv: fcopy: switch to using the hvutil_device_state state\n machine.\n- Drivers: hv: hv_balloon: correctly handle num_pages\u003eINT_MAX case.\n- Drivers: hv: hv_balloon: correctly handle val.freeram lower than num_pages case.\n- Drivers: hv: hv_balloon: do not lose memory when onlining order is not\n natural.\n- Drivers: hv: hv_balloon: do not online pages in offline blocks.\n- Drivers: hv: hv_balloon: eliminate jumps in piecewiese linear floor\n function.\n- Drivers: hv: hv_balloon: eliminate the trylock path in\n acquire/release_region_mutex.\n- Drivers: hv: hv_balloon: keep locks balanced on add_memory() failure.\n- Drivers: hv: hv_balloon: refuse to balloon below the floor.\n- Drivers: hv: hv_balloon: report offline pages as being used.\n- Drivers: hv: hv_balloon: survive ballooning request with num_pages=0.\n- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.\n- Drivers: hv: kvp: rename kvp_work -\u003e kvp_timeout_work.\n- Drivers: hv: kvp: reset kvp_context.\n- Drivers: hv: kvp: switch to using the hvutil_device_state state\n machine.\n- Drivers: hv: util: Fix a bug in the KVP code. reapply upstream change\n ontop of v3.12-stable change\n- Drivers: hv: util: On device remove, close the channel after\n de-initializing the service.\n- Drivers: hv: util: introduce hv_utils_transport abstraction.\n- Drivers: hv: util: introduce state machine for util drivers.\n- Drivers: hv: util: move kvp/vss function declarations to\n hyperv_vmbus.h.\n- Drivers: hv: vmbus: Add device and vendor ID to vmbus devices.\n- Drivers: hv: vmbus: Add support for VMBus panic notifier handler\n (bsc#934160).\n- Drivers: hv: vmbus: Add support for the NetworkDirect GUID.\n- Drivers: hv: vmbus: Correcting truncation error for constant\n HV_CRASH_CTL_CRASH_NOTIFY (bsc#934160).\n- Drivers: hv: vmbus: Export the vmbus_sendpacket_pagebuffer_ctl().\n- Drivers: hv: vmbus: Fix a bug in rescind processing in\n vmbus_close_internal().\n- Drivers: hv: vmbus: Fix a siganlling host signalling issue.\n- Drivers: hv: vmbus: Get rid of some unnecessary messages.\n- Drivers: hv: vmbus: Get rid of some unused definitions.\n- Drivers: hv: vmbus: Handle both rescind and offer messages in the same\n context.\n- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus\n state.\n- Drivers: hv: vmbus: Introduce a function to remove a rescinded offer.\n- Drivers: hv: vmbus: Perform device register in the per-channel work\n element.\n- Drivers: hv: vmbus: Permit sending of packets without payload.\n- Drivers: hv: vmbus: Properly handle child device remove.\n- Drivers: hv: vmbus: Remove the channel from the channel list(s) on\n failure.\n- Drivers: hv: vmbus: Suport an API to send packet with additional\n control.\n- Drivers: hv: vmbus: Suport an API to send pagebuffers with additional\n control.\n- Drivers: hv: vmbus: Teardown clockevent devices on module unload.\n- Drivers: hv: vmbus: Teardown synthetic interrupt controllers on module\n unload.\n- Drivers: hv: vmbus: Use a round-robin algorithm for picking the\n outgoing channel.\n- Drivers: hv: vmbus: Use the vp_index map even for channels bound to CPU\n 0.\n- Drivers: hv: vmbus: avoid double kfree for device_obj.\n- Drivers: hv: vmbus: briefly comment num_sc and next_oc.\n- Drivers: hv: vmbus: decrease num_sc on subchannel removal.\n- Drivers: hv: vmbus: distribute subchannels among all vcpus.\n- Drivers: hv: vmbus: do cleanup on all vmbus_open() failure paths.\n- Drivers: hv: vmbus: introduce vmbus_acpi_remove.\n- Drivers: hv: vmbus: kill tasklets on module unload.\n- Drivers: hv: vmbus: move init_vp_index() call to vmbus_process_offer().\n- Drivers: hv: vmbus: prevent cpu offlining on newer hypervisors.\n- Drivers: hv: vmbus: rename channel work queues.\n- Drivers: hv: vmbus: teardown hv_vmbus_con workqueue and\n vmbus_connection pages on shutdown.\n- Drivers: hv: vmbus: unify calls to percpu_channel_enq().\n- Drivers: hv: vmbus: unregister panic notifier on module unload.\n- Drivers: hv: vmbus:Update preferred vmbus protocol version to windows\n 10.\n- Drivers: hv: vss: process deferred messages when we complete the\n transaction.\n- Drivers: hv: vss: switch to using the hvutil_device_state state\n machine.\n- Enable CONFIG_BRIDGE_NF_EBTABLES on s390x (bsc#936012)\n- Fix connection reuse when sk_error_report is used (bsc#930972).\n- GHES: Carve out error queueing in a separate function (bsc#917630).\n- GHES: Carve out the panic functionality (bsc#917630).\n- GHES: Elliminate double-loop in the NMI handler (bsc#917630).\n- GHES: Make NMI handler have a single reader (bsc#917630).\n- GHES: Panic right after detection (bsc#917630).\n- IB/mlx4: Fix wrong usage of IPv4 protocol for multicast attach/detach\n (bsc#918618).\n- Initialize hv_netvsc_packet-\u003exmit_more to avoid transfer stalls\n- KVM: PPC: BOOK3S: HV: CMA: Reserve cma region only in hypervisor mode\n (bsc#908491).\n- KVM: s390: virtio-ccw: Handle command rejects (bsc#931860).\n- MODSIGN: loading keys from db when SecureBoot disabled (bsc#929696).\n- MODSIGN: loading keys from db when SecureBoot disabled (bsc#929696).\n- PCI: pciehp: Add hotplug_lock to serialize hotplug events (bsc#866911).\n- Revert \u0027MODSIGN: loading keys from db when SecureBoot disabled\u0027. This\n reverts commit b45412d4, because it breaks legacy boot.\n- SUNRPC: Report connection error values to rpc_tasks on the pending\n queue (bsc#930972).\n- Update s390x kabi files with netfilter change (bsc#936012)\n- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set\n (bsc#932348).\n- cpufreq: pcc: Enable autoload of pcc-cpufreq for ACPI processors\n (bsc#933117).\n- dmapi: fix value from newer Linux strnlen_user() (bsc#932897).\n- drm/i915/hsw: Fix workaround for server AUX channel clock divisor\n (bsc#935918).\n- drm/i915: Evict CS TLBs between batches (bsc#935918).\n- drm/i915: Fix DDC probe for passive adapters (bsc#935918).\n- drm/i915: Handle failure to kick out a conflicting fb driver\n (bsc#935918).\n- drm/i915: drop WaSetupGtModeTdRowDispatch:snb (bsc#935918).\n- drm/i915: save/restore GMBUS freq across suspend/resume on gen4\n (bsc#935918).\n- edd: support original Phoenix EDD 3.0 information (bsc#929974).\n- ext4: fix over-defensive complaint after journal abort (bsc#935174).\n- fs/cifs: Fix corrupt SMB2 ioctl requests (bsc#931124).\n- ftrace: add oco handling patch (bsc#924526).\n- ftrace: allow architectures to specify ftrace compile options\n (bsc#924526).\n- ftrace: let notrace function attribute disable hotpatching if necessary\n (bsc#924526).\n- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES\n (bsc#930092).\n- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bsc#930092).\n- hv: channel: match var type to return type of wait_for_completion.\n- hv: do not schedule new works in\n vmbus_onoffer()/vmbus_onoffer_rescind().\n- hv: hv_balloon: match var type to return type of wait_for_completion.\n- hv: hv_util: move vmbus_open() to a later place.\n- hv: hypervvssd: call endmntent before call setmntent again.\n- hv: no rmmod for hv_vmbus and hv_utils.\n- hv: remove the per-channel workqueue.\n- hv: run non-blocking message handlers in the dispatch tasklet.\n- hv: vmbus: missing curly braces in vmbus_process_offer().\n- hv: vmbus_free_channels(): remove the redundant free_channel().\n- hv: vmbus_open(): reset the channel state on ENOMEM.\n- hv: vmbus_post_msg: retry the hypercall on some transient errors.\n- hv_netvsc: Allocate the receive buffer from the correct NUMA node.\n- hv_netvsc: Allocate the sendbuf in a NUMA aware way.\n- hv_netvsc: Clean up two unused variables.\n- hv_netvsc: Cleanup the test for freeing skb when we use sendbuf\n mechanism.\n- hv_netvsc: Define a macro RNDIS_AND_PPI_SIZE.\n- hv_netvsc: Eliminate memory allocation in the packet send path.\n- hv_netvsc: Fix a bug in netvsc_start_xmit().\n- hv_netvsc: Fix the packet free when it is in skb headroom.\n- hv_netvsc: Implement batching in send buffer.\n- hv_netvsc: Implement partial copy into send buffer.\n- hv_netvsc: Use the xmit_more skb flag to optimize signaling the host.\n- hv_netvsc: change member name of struct netvsc_stats.\n- hv_netvsc: introduce netif-msg into netvsc module.\n- hv_netvsc: remove unused variable in netvsc_send().\n- hv_netvsc: remove vmbus_are_subchannels_present() in\n rndis_filter_device_add().\n- hv_netvsc: try linearizing big SKBs before dropping them.\n- hv_netvsc: use per_cpu stats to calculate TX/RX data.\n- hv_netvsc: use single existing drop path in netvsc_start_xmit.\n- hv_vmbus: Add gradually increased delay for retries in\n vmbus_post_msg().\n- hyperv: Implement netvsc_get_channels() ethool op.\n- hyperv: hyperv_fb: match wait_for_completion_timeout return type.\n- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).\n- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935881).\n- ipr: Increase default adapter init stage change timeout (bsc#930579).\n- ipv6: do not delete previously existing ECMP routes if add fails\n (bsc#930399).\n- ipv6: fix ECMP route replacement (bsc#930399).\n- jbd2: improve error messages for inconsistent journal heads\n (bsc#935174).\n- jbd2: revise KERN_EMERG error messages (bsc#935174).\n- kabi/severities: Add s390 symbols allowed to change in bsc#931860\n- kabi: only use sops-\u003eget_inode_dev with proper fsflag.\n- kernel: add panic_on_warn.\n- kexec: allocate the kexec control page with KEXEC_CONTROL_MEMORY_GFP\n (bsc#928131).\n- kgr: fix redirection on s390x arch (bsc#903279).\n- kgr: move kgr_task_in_progress() to sched.h.\n- kgr: send a fake signal to all blocking tasks.\n- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table\n (bsc#926953).\n- libata: Blacklist queued TRIM on all Samsung 800-series (bsc#930599).\n- mei: bus: () can be static.\n- mm, thp: really limit transparent hugepage allocation to local node (VM\n Performance, bsc#931620).\n- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM\n Performance, bsc#931620).\n- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM\n Performance, bsc#931620).\n- mm/thp: allocate transparent hugepages on local node (VM Performance,\n bsc#931620).\n- net/mlx4_en: Call register_netdevice in the proper location\n (bsc#858727).\n- net/mlx4_en: Do not attempt to TX offload the outer UDP checksum for\n VXLAN (bsc#858727).\n- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference\n (bsc#867362).\n- net: introduce netdev_alloc_pcpu_stats() for drivers.\n- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).\n- netdev: set __percpu attribute on netdev_alloc_pcpu_stats.\n- netdev_alloc_pcpu_stats: use less common iterator variable.\n- netfilter: xt_NFQUEUE: fix --queue-bypass regression (bsc#935083)\n- ovl: default permissions (bsc#924071).\n- ovl: move s_stack_depth .\n- powerpc/perf/hv-24x7: use kmem_cache instead of aligned stack\n allocations (bsc#931403).\n- powerpc/pseries: Correct cpu affinity for dlpar added cpus (bsc#932967).\n- powerpc: Add VM_FAULT_HWPOISON handling to powerpc page fault handler\n (bsc#929475).\n- powerpc: Fill in si_addr_lsb siginfo field (bsc#929475).\n- powerpc: Simplify do_sigbus (bsc#929475).\n- reiserfs: Fix use after free in journal teardown (bsc#927697).\n- rtlwifi: rtl8192cu: Fix kernel deadlock (bsc#927786).\n- s390/airq: add support for irq ranges (bsc#931860).\n- s390/airq: silence lockdep warning (bsc#931860).\n- s390/compat,signal: change return values to -EFAULT (bsc#929879).\n- s390/ftrace: hotpatch support for function tracing (bsc#924526).\n- s390/irq: improve displayed interrupt order in /proc/interrupts\n (bsc#931860).\n- s390/kernel: use stnsm 255 instead of stosm 0 (bsc#929879).\n- s390/kgr: reorganize kgr infrastructure in entry64.S.\n- s390/mm: align 64-bit PIE binaries to 4GB (bsc#929879).\n- s390/mm: limit STACK_RND_MASK for compat tasks (bsc#929879).\n- s390/rwlock: add missing local_irq_restore calls (bsc#929879).\n- s390/sclp_vt220: Fix kernel panic due to early terminal input\n (bsc#931860).\n- s390/smp: only send external call ipi if needed (bsc#929879).\n- s390/spinlock,rwlock: always to a load-and-test first (bsc#929879).\n- s390/spinlock: cleanup spinlock code (bsc#929879).\n- s390/spinlock: optimize spin_unlock code (bsc#929879).\n- s390/spinlock: optimize spinlock code sequence (bsc#929879).\n- s390/spinlock: refactor arch_spin_lock_wait[_flags] (bsc#929879).\n- s390/time: use stck clock fast for do_account_vtime (bsc#929879).\n- s390: Remove zfcpdump NR_CPUS dependency (bsc#929879).\n- s390: add z13 code generation support (bsc#929879).\n- s390: avoid z13 cache aliasing (bsc#929879).\n- s390: fix control register update (bsc#929879).\n- s390: optimize control register update (bsc#929879).\n- s390: z13 base performance (bsc#929879).\n- sched: fix __sched_setscheduler() vs load balancing race (bsc#921430)\n- scsi: retry MODE SENSE on unit attention (bsc#895814).\n- scsi_dh_alua: Recheck state on unit attention (bsc#895814).\n- scsi_dh_alua: fixup crash in alua_rtpg_work() (bsc#895814).\n- scsi_dh_alua: parse device id instead of target id (bsc#895814).\n- scsi_dh_alua: recheck RTPG in regular intervals (bsc#895814).\n- scsi_dh_alua: update all port states (bsc#895814).\n- sd: always retry READ CAPACITY for ALUA state transition (bsc#895814).\n- st: null pointer dereference panic caused by use after kref_put by\n st_open (bsc#936875).\n- supported.conf: add btrfs to kernel-$flavor-base (bsc#933637)\n- udf: Remove repeated loads blocksize (bsc#933907).\n- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub\n port reset (bsc#938024).\n- vTPM: set virtual device before passing to ibmvtpm_reset_crq\n (bsc#937087).\n- vfs: add super_operations-\u003eget_inode_dev (bsc#927455).\n- virtio-ccw: virtio-ccw adapter interrupt support (bsc#931860).\n- virtio-rng: do not crash if virtqueue is broken (bsc#931860).\n- virtio: fail adding buffer on broken queues (bsc#931860).\n- virtio: virtio_break_device() to mark all virtqueues broken\n (bsc#931860).\n- virtio_blk: verify if queue is broken after virtqueue_get_buf()\n (bsc#931860).\n- virtio_ccw: fix hang in set offline processing (bsc#931860).\n- virtio_ccw: fix vcdev pointer handling issues (bsc#931860).\n- virtio_ccw: introduce device_lost in virtio_ccw_device (bsc#931860).\n- virtio_net: do not crash if virtqueue is broken (bsc#931860).\n- virtio_net: verify if queue is broken after virtqueue_get_buf()\n (bsc#931860).\n- virtio_ring: adapt to notify() returning bool (bsc#931860).\n- virtio_ring: add new function virtqueue_is_broken() (bsc#931860).\n- virtio_ring: change host notification API (bsc#931860).\n- virtio_ring: let virtqueue_{kick()/notify()} return a bool\n (bsc#931860).\n- virtio_ring: plug kmemleak false positive (bsc#931860).\n- virtio_scsi: do not call virtqueue_add_sgs(... GFP_NOIO) holding\n spinlock (bsc#931860).\n- virtio_scsi: verify if queue is broken after virtqueue_get_buf()\n (bsc#931860).\n- vmxnet3: Bump up driver version number (bsc#936423).\n- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).\n- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).\n- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).\n- x86/PCI: Use host bridge _CRS info on Foxconn K8M890-8237A\n (bsc#907092).\n- x86/PCI: Use host bridge _CRS info on systems with \u003e32 bit addressing\n (bsc#907092).\n- x86/kgr: move kgr infrastructure from asm to C.\n- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).\n- xfrm: release dst_orig in case of error in xfrm_lookup() (bsc#932793).\n- xfs: Skip dirty pages in -\u003ereleasepage (bsc#915183).\n- xfs: fix xfs_setattr for DMAPI (bsc#932900).\n- xfs_dmapi: fix transaction ilocks (bsc#932899).\n- xfs_dmapi: fix value from newer Linux strnlen_user() (bsc#932897).\n- xfs_dmapi: xfs_dm_rdwr() uses dir file ops not file\u0027s ops (bsc#932898).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-2015-356,SUSE-SLE-Live-Patching-12-2015-356,SUSE-SLE-Module-Public-Cloud-12-2015-356,SUSE-SLE-SDK-12-2015-356,SUSE-SLE-SERVER-12-2015-356,SUSE-SLE-WE-12-2015-356",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1324-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2015:1324-1",
"url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151324-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2015:1324-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html"
},
{
"category": "self",
"summary": "SUSE Bug 854817",
"url": "https://bugzilla.suse.com/854817"
},
{
"category": "self",
"summary": "SUSE Bug 854824",
"url": "https://bugzilla.suse.com/854824"
},
{
"category": "self",
"summary": "SUSE Bug 858727",
"url": "https://bugzilla.suse.com/858727"
},
{
"category": "self",
"summary": "SUSE Bug 866911",
"url": "https://bugzilla.suse.com/866911"
},
{
"category": "self",
"summary": "SUSE Bug 867362",
"url": "https://bugzilla.suse.com/867362"
},
{
"category": "self",
"summary": "SUSE Bug 895814",
"url": "https://bugzilla.suse.com/895814"
},
{
"category": "self",
"summary": "SUSE Bug 903279",
"url": "https://bugzilla.suse.com/903279"
},
{
"category": "self",
"summary": "SUSE Bug 907092",
"url": "https://bugzilla.suse.com/907092"
},
{
"category": "self",
"summary": "SUSE Bug 908491",
"url": "https://bugzilla.suse.com/908491"
},
{
"category": "self",
"summary": "SUSE Bug 915183",
"url": "https://bugzilla.suse.com/915183"
},
{
"category": "self",
"summary": "SUSE Bug 917630",
"url": "https://bugzilla.suse.com/917630"
},
{
"category": "self",
"summary": "SUSE Bug 918618",
"url": "https://bugzilla.suse.com/918618"
},
{
"category": "self",
"summary": "SUSE Bug 921430",
"url": "https://bugzilla.suse.com/921430"
},
{
"category": "self",
"summary": "SUSE Bug 924071",
"url": "https://bugzilla.suse.com/924071"
},
{
"category": "self",
"summary": "SUSE Bug 924526",
"url": "https://bugzilla.suse.com/924526"
},
{
"category": "self",
"summary": "SUSE Bug 926369",
"url": "https://bugzilla.suse.com/926369"
},
{
"category": "self",
"summary": "SUSE Bug 926953",
"url": "https://bugzilla.suse.com/926953"
},
{
"category": "self",
"summary": "SUSE Bug 927455",
"url": "https://bugzilla.suse.com/927455"
},
{
"category": "self",
"summary": "SUSE Bug 927697",
"url": "https://bugzilla.suse.com/927697"
},
{
"category": "self",
"summary": "SUSE Bug 927786",
"url": "https://bugzilla.suse.com/927786"
},
{
"category": "self",
"summary": "SUSE Bug 928131",
"url": "https://bugzilla.suse.com/928131"
},
{
"category": "self",
"summary": "SUSE Bug 929475",
"url": "https://bugzilla.suse.com/929475"
},
{
"category": "self",
"summary": "SUSE Bug 929696",
"url": "https://bugzilla.suse.com/929696"
},
{
"category": "self",
"summary": "SUSE Bug 929879",
"url": "https://bugzilla.suse.com/929879"
},
{
"category": "self",
"summary": "SUSE Bug 929974",
"url": "https://bugzilla.suse.com/929974"
},
{
"category": "self",
"summary": "SUSE Bug 930092",
"url": "https://bugzilla.suse.com/930092"
},
{
"category": "self",
"summary": "SUSE Bug 930399",
"url": "https://bugzilla.suse.com/930399"
},
{
"category": "self",
"summary": "SUSE Bug 930579",
"url": "https://bugzilla.suse.com/930579"
},
{
"category": "self",
"summary": "SUSE Bug 930599",
"url": "https://bugzilla.suse.com/930599"
},
{
"category": "self",
"summary": "SUSE Bug 930972",
"url": "https://bugzilla.suse.com/930972"
},
{
"category": "self",
"summary": "SUSE Bug 931124",
"url": "https://bugzilla.suse.com/931124"
},
{
"category": "self",
"summary": "SUSE Bug 931403",
"url": "https://bugzilla.suse.com/931403"
},
{
"category": "self",
"summary": "SUSE Bug 931538",
"url": "https://bugzilla.suse.com/931538"
},
{
"category": "self",
"summary": "SUSE Bug 931620",
"url": "https://bugzilla.suse.com/931620"
},
{
"category": "self",
"summary": "SUSE Bug 931860",
"url": "https://bugzilla.suse.com/931860"
},
{
"category": "self",
"summary": "SUSE Bug 931988",
"url": "https://bugzilla.suse.com/931988"
},
{
"category": "self",
"summary": "SUSE Bug 932348",
"url": "https://bugzilla.suse.com/932348"
},
{
"category": "self",
"summary": "SUSE Bug 932793",
"url": "https://bugzilla.suse.com/932793"
},
{
"category": "self",
"summary": "SUSE Bug 932897",
"url": "https://bugzilla.suse.com/932897"
},
{
"category": "self",
"summary": "SUSE Bug 932898",
"url": "https://bugzilla.suse.com/932898"
},
{
"category": "self",
"summary": "SUSE Bug 932899",
"url": "https://bugzilla.suse.com/932899"
},
{
"category": "self",
"summary": "SUSE Bug 932900",
"url": "https://bugzilla.suse.com/932900"
},
{
"category": "self",
"summary": "SUSE Bug 932967",
"url": "https://bugzilla.suse.com/932967"
},
{
"category": "self",
"summary": "SUSE Bug 933117",
"url": "https://bugzilla.suse.com/933117"
},
{
"category": "self",
"summary": "SUSE Bug 933429",
"url": "https://bugzilla.suse.com/933429"
},
{
"category": "self",
"summary": "SUSE Bug 933637",
"url": "https://bugzilla.suse.com/933637"
},
{
"category": "self",
"summary": "SUSE Bug 933896",
"url": "https://bugzilla.suse.com/933896"
},
{
"category": "self",
"summary": "SUSE Bug 933904",
"url": "https://bugzilla.suse.com/933904"
},
{
"category": "self",
"summary": "SUSE Bug 933907",
"url": "https://bugzilla.suse.com/933907"
},
{
"category": "self",
"summary": "SUSE Bug 934160",
"url": "https://bugzilla.suse.com/934160"
},
{
"category": "self",
"summary": "SUSE Bug 935083",
"url": "https://bugzilla.suse.com/935083"
},
{
"category": "self",
"summary": "SUSE Bug 935085",
"url": "https://bugzilla.suse.com/935085"
},
{
"category": "self",
"summary": "SUSE Bug 935088",
"url": "https://bugzilla.suse.com/935088"
},
{
"category": "self",
"summary": "SUSE Bug 935174",
"url": "https://bugzilla.suse.com/935174"
},
{
"category": "self",
"summary": "SUSE Bug 935542",
"url": "https://bugzilla.suse.com/935542"
},
{
"category": "self",
"summary": "SUSE Bug 935881",
"url": "https://bugzilla.suse.com/935881"
},
{
"category": "self",
"summary": "SUSE Bug 935918",
"url": "https://bugzilla.suse.com/935918"
},
{
"category": "self",
"summary": "SUSE Bug 936012",
"url": "https://bugzilla.suse.com/936012"
},
{
"category": "self",
"summary": "SUSE Bug 936423",
"url": "https://bugzilla.suse.com/936423"
},
{
"category": "self",
"summary": "SUSE Bug 936445",
"url": "https://bugzilla.suse.com/936445"
},
{
"category": "self",
"summary": "SUSE Bug 936446",
"url": "https://bugzilla.suse.com/936446"
},
{
"category": "self",
"summary": "SUSE Bug 936502",
"url": "https://bugzilla.suse.com/936502"
},
{
"category": "self",
"summary": "SUSE Bug 936556",
"url": "https://bugzilla.suse.com/936556"
},
{
"category": "self",
"summary": "SUSE Bug 936831",
"url": "https://bugzilla.suse.com/936831"
},
{
"category": "self",
"summary": "SUSE Bug 936875",
"url": "https://bugzilla.suse.com/936875"
},
{
"category": "self",
"summary": "SUSE Bug 937032",
"url": "https://bugzilla.suse.com/937032"
},
{
"category": "self",
"summary": "SUSE Bug 937087",
"url": "https://bugzilla.suse.com/937087"
},
{
"category": "self",
"summary": "SUSE Bug 937609",
"url": "https://bugzilla.suse.com/937609"
},
{
"category": "self",
"summary": "SUSE Bug 937612",
"url": "https://bugzilla.suse.com/937612"
},
{
"category": "self",
"summary": "SUSE Bug 937613",
"url": "https://bugzilla.suse.com/937613"
},
{
"category": "self",
"summary": "SUSE Bug 937616",
"url": "https://bugzilla.suse.com/937616"
},
{
"category": "self",
"summary": "SUSE Bug 938022",
"url": "https://bugzilla.suse.com/938022"
},
{
"category": "self",
"summary": "SUSE Bug 938023",
"url": "https://bugzilla.suse.com/938023"
},
{
"category": "self",
"summary": "SUSE Bug 938024",
"url": "https://bugzilla.suse.com/938024"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9728 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9729 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9730 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9731 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1805 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3212 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4036 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4036/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4167 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4692 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4692/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5364 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5366 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5366/"
}
],
"title": "Security update for the SUSE Linux Enterprise 12 kernel",
"tracking": {
"current_release_date": "2015-07-16T14:57:20Z",
"generator": {
"date": "2015-07-16T14:57:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2015:1324-1",
"initial_release_date": "2015-07-16T14:57:20Z",
"revision_history": [
{
"date": "2015-07-16T14:57:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.44-52.10.1.noarch",
"product": {
"name": "kernel-devel-3.12.44-52.10.1.noarch",
"product_id": "kernel-devel-3.12.44-52.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.44-52.10.1.noarch",
"product": {
"name": "kernel-macros-3.12.44-52.10.1.noarch",
"product_id": "kernel-macros-3.12.44-52.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.44-52.10.1.noarch",
"product": {
"name": "kernel-source-3.12.44-52.10.1.noarch",
"product_id": "kernel-source-3.12.44-52.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-3.12.44-52.10.3.noarch",
"product": {
"name": "kernel-docs-3.12.44-52.10.3.noarch",
"product_id": "kernel-docs-3.12.44-52.10.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.44-52.10.1.ppc64le",
"product": {
"name": "kernel-obs-build-3.12.44-52.10.1.ppc64le",
"product_id": "kernel-obs-build-3.12.44-52.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.44-52.10.1.ppc64le",
"product": {
"name": "kernel-default-3.12.44-52.10.1.ppc64le",
"product_id": "kernel-default-3.12.44-52.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.44-52.10.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.44-52.10.1.ppc64le",
"product_id": "kernel-default-base-3.12.44-52.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.44-52.10.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.44-52.10.1.ppc64le",
"product_id": "kernel-default-devel-3.12.44-52.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.44-52.10.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.44-52.10.1.ppc64le",
"product_id": "kernel-syms-3.12.44-52.10.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.44-52.10.1.s390x",
"product": {
"name": "kernel-obs-build-3.12.44-52.10.1.s390x",
"product_id": "kernel-obs-build-3.12.44-52.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.44-52.10.1.s390x",
"product": {
"name": "kernel-default-3.12.44-52.10.1.s390x",
"product_id": "kernel-default-3.12.44-52.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.44-52.10.1.s390x",
"product": {
"name": "kernel-default-base-3.12.44-52.10.1.s390x",
"product_id": "kernel-default-base-3.12.44-52.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.44-52.10.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.44-52.10.1.s390x",
"product_id": "kernel-default-devel-3.12.44-52.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.44-52.10.1.s390x",
"product": {
"name": "kernel-default-man-3.12.44-52.10.1.s390x",
"product_id": "kernel-default-man-3.12.44-52.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.44-52.10.1.s390x",
"product": {
"name": "kernel-syms-3.12.44-52.10.1.s390x",
"product_id": "kernel-syms-3.12.44-52.10.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-default-3.12.44-52.10.1.x86_64",
"product_id": "kernel-default-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.44-52.10.1.x86_64",
"product_id": "kernel-default-devel-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-default-extra-3.12.44-52.10.1.x86_64",
"product_id": "kernel-default-extra-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-syms-3.12.44-52.10.1.x86_64",
"product_id": "kernel-syms-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-xen-3.12.44-52.10.1.x86_64",
"product_id": "kernel-xen-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.44-52.10.1.x86_64",
"product_id": "kernel-xen-devel-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"product_id": "kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"product_id": "kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.44-52.10.1.x86_64",
"product_id": "kernel-ec2-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-obs-build-3.12.44-52.10.1.x86_64",
"product_id": "kernel-obs-build-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.44-52.10.1.x86_64",
"product_id": "kernel-default-base-3.12.44-52.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.44-52.10.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.44-52.10.1.x86_64",
"product_id": "kernel-xen-base-3.12.44-52.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12",
"product": {
"name": "SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12",
"product": {
"name": "SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12",
"product_id": "SUSE Linux Enterprise Workstation Extension 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-extra-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.44-52.10.1.noarch as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch"
},
"product_reference": "kernel-devel-3.12.44-52.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.44-52.10.1.noarch as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch"
},
"product_reference": "kernel-macros-3.12.44-52.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.44-52.10.1.noarch as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch"
},
"product_reference": "kernel-source-3.12.44-52.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-syms-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-xen-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.12.44-52.10.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch"
},
"product_reference": "kernel-docs-3.12.44-52.10.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.44-52.10.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le"
},
"product_reference": "kernel-obs-build-3.12.44-52.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-obs-build-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-obs-build-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.44-52.10.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le"
},
"product_reference": "kernel-default-3.12.44-52.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-default-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.44-52.10.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.44-52.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-default-base-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.44-52.10.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.44-52.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-default-man-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.44-52.10.1.noarch as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch"
},
"product_reference": "kernel-devel-3.12.44-52.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.44-52.10.1.noarch as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch"
},
"product_reference": "kernel-macros-3.12.44-52.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.44-52.10.1.noarch as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch"
},
"product_reference": "kernel-source-3.12.44-52.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.44-52.10.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.44-52.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-syms-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-syms-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-xen-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.44-52.10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le"
},
"product_reference": "kernel-default-3.12.44-52.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-default-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.44-52.10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.44-52.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-default-base-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.44-52.10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.44-52.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-default-man-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.44-52.10.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch"
},
"product_reference": "kernel-devel-3.12.44-52.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.44-52.10.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch"
},
"product_reference": "kernel-macros-3.12.44-52.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.44-52.10.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch"
},
"product_reference": "kernel-source-3.12.44-52.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.44-52.10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.44-52.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.44-52.10.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x"
},
"product_reference": "kernel-syms-3.12.44-52.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-syms-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-xen-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.44-52.10.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12",
"product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
},
"product_reference": "kernel-default-extra-3.12.44-52.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-9728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9728"
}
],
"notes": [
{
"category": "general",
"text": "The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9728",
"url": "https://www.suse.com/security/cve/CVE-2014-9728"
},
{
"category": "external",
"summary": "SUSE Bug 911325 for CVE-2014-9728",
"url": "https://bugzilla.suse.com/911325"
},
{
"category": "external",
"summary": "SUSE Bug 933904 for CVE-2014-9728",
"url": "https://bugzilla.suse.com/933904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "low"
}
],
"title": "CVE-2014-9728"
},
{
"cve": "CVE-2014-9729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9729"
}
],
"notes": [
{
"category": "general",
"text": "The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9729",
"url": "https://www.suse.com/security/cve/CVE-2014-9729"
},
{
"category": "external",
"summary": "SUSE Bug 911325 for CVE-2014-9729",
"url": "https://bugzilla.suse.com/911325"
},
{
"category": "external",
"summary": "SUSE Bug 933904 for CVE-2014-9729",
"url": "https://bugzilla.suse.com/933904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "important"
}
],
"title": "CVE-2014-9729"
},
{
"cve": "CVE-2014-9730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9730"
}
],
"notes": [
{
"category": "general",
"text": "The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9730",
"url": "https://www.suse.com/security/cve/CVE-2014-9730"
},
{
"category": "external",
"summary": "SUSE Bug 911325 for CVE-2014-9730",
"url": "https://bugzilla.suse.com/911325"
},
{
"category": "external",
"summary": "SUSE Bug 933904 for CVE-2014-9730",
"url": "https://bugzilla.suse.com/933904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "important"
}
],
"title": "CVE-2014-9730"
},
{
"cve": "CVE-2014-9731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9731"
}
],
"notes": [
{
"category": "general",
"text": "The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target\u0027s name along with a trailing \\0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9731",
"url": "https://www.suse.com/security/cve/CVE-2014-9731"
},
{
"category": "external",
"summary": "SUSE Bug 911325 for CVE-2014-9731",
"url": "https://bugzilla.suse.com/911325"
},
{
"category": "external",
"summary": "SUSE Bug 933896 for CVE-2014-9731",
"url": "https://bugzilla.suse.com/933896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "important"
}
],
"title": "CVE-2014-9731"
},
{
"cve": "CVE-2015-1805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1805"
}
],
"notes": [
{
"category": "general",
"text": "The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an \"I/O vector array overrun.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1805",
"url": "https://www.suse.com/security/cve/CVE-2015-1805"
},
{
"category": "external",
"summary": "SUSE Bug 917839 for CVE-2015-1805",
"url": "https://bugzilla.suse.com/917839"
},
{
"category": "external",
"summary": "SUSE Bug 933429 for CVE-2015-1805",
"url": "https://bugzilla.suse.com/933429"
},
{
"category": "external",
"summary": "SUSE Bug 939270 for CVE-2015-1805",
"url": "https://bugzilla.suse.com/939270"
},
{
"category": "external",
"summary": "SUSE Bug 964730 for CVE-2015-1805",
"url": "https://bugzilla.suse.com/964730"
},
{
"category": "external",
"summary": "SUSE Bug 964732 for CVE-2015-1805",
"url": "https://bugzilla.suse.com/964732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-1805"
},
{
"cve": "CVE-2015-3212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3212"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3212",
"url": "https://www.suse.com/security/cve/CVE-2015-3212"
},
{
"category": "external",
"summary": "SUSE Bug 936502 for CVE-2015-3212",
"url": "https://bugzilla.suse.com/936502"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-3212"
},
{
"cve": "CVE-2015-4036",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4036"
}
],
"notes": [
{
"category": "general",
"text": "Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4036",
"url": "https://www.suse.com/security/cve/CVE-2015-4036"
},
{
"category": "external",
"summary": "SUSE Bug 931988 for CVE-2015-4036",
"url": "https://bugzilla.suse.com/931988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-4036"
},
{
"cve": "CVE-2015-4167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4167"
}
],
"notes": [
{
"category": "general",
"text": "The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4167",
"url": "https://www.suse.com/security/cve/CVE-2015-4167"
},
{
"category": "external",
"summary": "SUSE Bug 917839 for CVE-2015-4167",
"url": "https://bugzilla.suse.com/917839"
},
{
"category": "external",
"summary": "SUSE Bug 933907 for CVE-2015-4167",
"url": "https://bugzilla.suse.com/933907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "important"
}
],
"title": "CVE-2015-4167"
},
{
"cve": "CVE-2015-4692",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4692"
}
],
"notes": [
{
"category": "general",
"text": "The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4692",
"url": "https://www.suse.com/security/cve/CVE-2015-4692"
},
{
"category": "external",
"summary": "SUSE Bug 935542 for CVE-2015-4692",
"url": "https://bugzilla.suse.com/935542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "important"
}
],
"title": "CVE-2015-4692"
},
{
"cve": "CVE-2015-5364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5364"
}
],
"notes": [
{
"category": "general",
"text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5364",
"url": "https://www.suse.com/security/cve/CVE-2015-5364"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 781018 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/781018"
},
{
"category": "external",
"summary": "SUSE Bug 936831 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/936831"
},
{
"category": "external",
"summary": "SUSE Bug 939276 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/939276"
},
{
"category": "external",
"summary": "SUSE Bug 945112 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/945112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-5364"
},
{
"cve": "CVE-2015-5366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5366"
}
],
"notes": [
{
"category": "general",
"text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5366",
"url": "https://www.suse.com/security/cve/CVE-2015-5366"
},
{
"category": "external",
"summary": "SUSE Bug 781018 for CVE-2015-5366",
"url": "https://bugzilla.suse.com/781018"
},
{
"category": "external",
"summary": "SUSE Bug 936831 for CVE-2015-5366",
"url": "https://bugzilla.suse.com/936831"
},
{
"category": "external",
"summary": "SUSE Bug 939276 for CVE-2015-5366",
"url": "https://bugzilla.suse.com/939276"
},
{
"category": "external",
"summary": "SUSE Bug 945112 for CVE-2015-5366",
"url": "https://bugzilla.suse.com/945112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-default-1-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_44-52_10-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.44-52.10.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.44-52.10.3.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.44-52.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.44-52.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-07-16T14:57:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-5366"
}
]
}
gsd-2015-4036
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2015-4036",
"description": "Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.",
"id": "GSD-2015-4036",
"references": [
"https://www.suse.com/security/cve/CVE-2015-4036.html",
"https://ubuntu.com/security/CVE-2015-4036",
"https://advisories.mageia.org/CVE-2015-4036.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-4036"
],
"details": "Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.",
"id": "GSD-2015-4036",
"modified": "2023-12-13T01:19:59.972166Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-4036",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-2634-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2634-1"
},
{
"name": "74664",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74664"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"name": "SUSE-SU-2015:1324",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
},
{
"name": "openSUSE-SU-2015:1382",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"name": "[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/05/13/4"
},
{
"name": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864"
},
{
"name": "USN-2633-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2633-1"
},
{
"name": "1033729",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033729"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.16.35",
"versionStartIncluding": "3.15",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.12.44",
"versionStartIncluding": "3.11",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.0",
"versionStartIncluding": "3.19",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.14.57",
"versionStartIncluding": "3.13",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.18.25",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.10.90",
"versionStartExcluding": "3.6",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-4036"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c"
},
{
"name": "[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.",
"refsource": "MLIST",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2015/05/13/4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189864"
},
{
"name": "74664",
"refsource": "BID",
"tags": [
"URL Repurposed",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/74664"
},
{
"name": "USN-2634-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2634-1"
},
{
"name": "USN-2633-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2633-1"
},
{
"name": "1033729",
"refsource": "SECTRACK",
"tags": [
"URL Repurposed"
],
"url": "http://www.securitytracker.com/id/1033729"
},
{
"name": "openSUSE-SU-2015:1382",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html"
},
{
"name": "SUSE-SU-2015:1324",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-11-21T19:15Z",
"publishedDate": "2015-08-31T20:59Z"
}
}
}
cnvd-2015-03474
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c
| Name | ['Linux Kernel 3.10.79', 'Linux Kernel 3.12.43', 'Linux Kernel 3.14.43', 'Linux Kernel 3.18.14'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-4036"
}
},
"description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u53d1\u5e03\u7684\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel \u0027vhost_scsi_make_tpg()\u0027\u51fd\u6570\uff08drivers/vhost/scsi.c\uff09\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u5f53\u7a0b\u5e8f\u4f7f\u7528CONFIG_VHOST_SCSI\u6307\u4ee4\u65f6\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5185\u6838\u5185\u5b58\u635f\u574f\uff09\uff0c\u6216\u83b7\u53d6\u63d0\u5347\u7684\u6743\u9650\u3002",
"discovererName": "Dan Carpenter",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-03474",
"openTime": "2015-05-29",
"patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u53d1\u5e03\u7684\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002 \r\n\r\nLinux kernel \u0027vhost_scsi_make_tpg()\u0027\u51fd\u6570\uff08drivers/vhost/scsi.c\uff09\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u5f53\u7a0b\u5e8f\u4f7f\u7528CONFIG_VHOST_SCSI\u6307\u4ee4\u65f6\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5185\u6838\u5185\u5b58\u635f\u574f\uff09\uff0c\u6216\u83b7\u53d6\u63d0\u5347\u7684\u6743\u9650\u3002\u76ee\u524d\uff0c\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux Kernel \u0027vhost_scsi_make_tpg()\u0027\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Linux Kernel 3.10.79",
"Linux Kernel 3.12.43",
"Linux Kernel 3.14.43",
"Linux Kernel 3.18.14"
]
},
"referenceLink": "http://secunia.com/advisories/64563/\r\nhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c",
"serverity": "\u4e2d",
"submitTime": "2015-05-28",
"title": "Linux Kernel \u0027vhost_scsi_make_tpg()\u0027\u5185\u5b58\u7834\u574f\u6f0f\u6d1e"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.