Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-5697 (GCVE-0-2015-5697)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:59:03.845Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "USN-2748-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2748-1"
},
{
"name": "USN-2751-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2751-1"
},
{
"name": "USN-2731-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2731-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "SUSE-SU-2015:1727",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html"
},
{
"name": "[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2015/07/28/2"
},
{
"name": "76066",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/76066"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "USN-2752-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2752-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011"
},
{
"name": "DSA-3329",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2015/dsa-3329"
},
{
"name": "USN-2732-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2732-1"
},
{
"name": "USN-2749-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2749-1"
},
{
"name": "FEDORA-2015-12908",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "FEDORA-2015-13396",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html"
},
{
"name": "FEDORA-2015-13391",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html"
},
{
"name": "1033211",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1033211"
},
{
"name": "USN-2777-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2777-1"
},
{
"name": "FEDORA-2015-12917",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-07-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-20T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "USN-2748-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2748-1"
},
{
"name": "USN-2751-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2751-1"
},
{
"name": "USN-2731-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2731-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "SUSE-SU-2015:1727",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html"
},
{
"name": "[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2015/07/28/2"
},
{
"name": "76066",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/76066"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "USN-2752-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2752-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011"
},
{
"name": "DSA-3329",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2015/dsa-3329"
},
{
"name": "USN-2732-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2732-1"
},
{
"name": "USN-2749-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2749-1"
},
{
"name": "FEDORA-2015-12908",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "FEDORA-2015-13396",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html"
},
{
"name": "FEDORA-2015-13391",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html"
},
{
"name": "1033211",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1033211"
},
{
"name": "USN-2777-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2777-1"
},
{
"name": "FEDORA-2015-12917",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-5697",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-2748-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2748-1"
},
{
"name": "USN-2751-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2751-1"
},
{
"name": "USN-2731-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2731-1"
},
{
"name": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "SUSE-SU-2015:1727",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html"
},
{
"name": "[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/07/28/2"
},
{
"name": "76066",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76066"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "USN-2752-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2752-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011"
},
{
"name": "DSA-3329",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3329"
},
{
"name": "USN-2732-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2732-1"
},
{
"name": "USN-2749-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2749-1"
},
{
"name": "FEDORA-2015-12908",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "FEDORA-2015-13396",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html"
},
{
"name": "FEDORA-2015-13391",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html"
},
{
"name": "1033211",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033211"
},
{
"name": "USN-2777-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2777-1"
},
{
"name": "FEDORA-2015-12917",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-5697",
"datePublished": "2015-08-31T10:00:00",
"dateReserved": "2015-07-29T00:00:00",
"dateUpdated": "2024-08-06T06:59:03.845Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2015-5697\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-08-31T10:59:14.847\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en la funci\u00f3n get_bitmap en drivers/md/md.c en el kernel de Linux en versiones anteriores a 4.1.6, no inicializa una cierta estructura de datos de mapa de bits, lo que permite a usuarios locales obtener informaci\u00f3n sensible de la memoria del kernel a trav\u00e9s de una llamada a GET_BITMAP_FILE de ioctl .\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.1.5\",\"matchCriteriaId\":\"44877FD6-2CE0-4950-B1C4-8B0A4E0E0333\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3329\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/07/28/2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/76066\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1033211\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2731-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2732-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2748-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2749-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2751-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2752-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2777-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1249011\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3329\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/07/28/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/76066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1033211\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2731-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2732-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2748-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2749-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2751-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2752-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2777-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1249011\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
suse-su-2015:1727-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-source",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 kernel was updated to 3.12.48-52.27 to\nreceive various security and bugfixes.\n\nFollowing security bugs were fixed:\n* CVE-2015-7613: A flaw was found in the Linux kernel IPC code that could\n lead to arbitrary code execution. The ipc_addid() function initialized\n a shared object that has unset uid/gid values. Since the fields are not\n initialized, the check can falsely succeed. (bsc#948536)\n* CVE-2015-5156: When a guests KVM network devices is in a bridge\n configuration the kernel can create a situation in which packets are\n fragmented in an unexpected fashion. The GRO functionality can create\n a situation in which multiple SKB\u0027s are chained together in a single\n packets fraglist (by design). (bsc#940776)\n* CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel before\n 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs\n that occurred during userspace execution, which might allow local\n users to gain privileges by triggering an NMI (bsc#938706).\n* CVE-2015-6252: A flaw was found in the way the Linux kernel\u0027s vhost\n driver treated userspace provided log file descriptor when processing\n the VHOST_SET_LOG_FD ioctl command. The file descriptor was never\n released and continued to consume kernel memory. A privileged local\n user with access to the /dev/vhost-net files could use this flaw to\n create a denial-of-service attack (bsc#942367).\n* CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the\n Linux kernel before 4.1.6 does not initialize a certain bitmap data\n structure, which allows local users to obtain sensitive information\n from kernel memory via a GET_BITMAP_FILE ioctl call. (bnc#939994)\n* CVE-2015-6937: A NULL pointer dereference flaw was found in the\n Reliable Datagram Sockets (RDS) implementation allowing a local user to\n cause system DoS. A verification was missing that the underlying\n transport exists when a connection was created. (bsc#945825)\n* CVE-2015-5283: A NULL pointer dereference flaw was found in SCTP\n implementation allowing a local user to cause system DoS. Creation of\n multiple sockets in parallel when system doesn\u0027t have SCTP module\n loaded can lead to kernel panic. (bsc#947155)\n\nThe following non-security bugs were fixed:\n- ALSA: hda - Abort the probe without i915 binding for HSW/BDW\n (bsc#936556).\n- Btrfs: Backport subvolume mount option handling (bsc#934962)\n- Btrfs: Handle unaligned length in extent_same (bsc#937609).\n- Btrfs: advertise which crc32c implementation is being used on mount\n (bsc#946057).\n- Btrfs: allow mounting btrfs subvolumes with different ro/rw options.\n- Btrfs: check if previous transaction aborted to avoid fs corruption\n (bnc#942509).\n- Btrfs: clean up error handling in mount_subvol() (bsc#934962).\n- Btrfs: cleanup orphans while looking up default subvolume (bsc#914818).\n- Btrfs: do not update mtime/ctime on deduped inodes (bsc#937616).\n- Btrfs: fail on mismatched subvol and subvolid mount options\n (bsc#934962).\n- Btrfs: fix chunk allocation regression leading to transaction abort\n (bnc#938550).\n- Btrfs: fix clone / extent-same deadlocks (bsc#937612).\n- Btrfs: fix crash on close_ctree() if cleaner starts new transaction\n (bnc#938891).\n- Btrfs: fix deadlock with extent-same and readpage (bsc#937612).\n- Btrfs: fix file corruption after cloning inline extents (bnc#942512).\n- Btrfs: fix file read corruption after extent cloning and fsync\n (bnc#946902).\n- Btrfs: fix find_free_dev_extent() malfunction in case device tree has\n hole (bnc#938550).\n- Btrfs: fix hang when failing to submit bio of directIO (bnc#942685).\n- Btrfs: fix list transaction-\u0026gt;pending_ordered corruption\n (bnc#938893).\n- Btrfs: fix memory corruption on failure to submit bio for direct IO\n (bnc#942685).\n- Btrfs: fix memory leak in the extent_same ioctl (bsc#937613).\n- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942685).\n- Btrfs: fix race between balance and unused block group deletion\n (bnc#938892).\n- Btrfs: fix range cloning when same inode used as source and destination\n (bnc#942511).\n- Btrfs: fix read corruption of compressed and shared extents\n (bnc#946906).\n- Btrfs: fix uninit variable in clone ioctl (bnc#942511).\n- Btrfs: fix use-after-free in mount_subvol().\n- Btrfs: fix wrong check for btrfs_force_chunk_alloc() (bnc#938550).\n- Btrfs: lock superblock before remounting for rw subvol (bsc#934962).\n- Btrfs: pass unaligned length to btrfs_cmp_data() (bsc#937609).\n- Btrfs: remove all subvol options before mounting top-level\n (bsc#934962).\n- Btrfs: show subvol= and subvolid= in /proc/mounts (bsc#934962).\n- Btrfs: unify subvol= and subvolid= mounting (bsc#934962).\n- Btrfs: fill -\u003elast_trans for delayed inode in btrfs_fill_inode\n (bnc#942925).\n- Btrfs: fix metadata inconsistencies after directory fsync (bnc#942925).\n- Btrfs: fix stale dir entries after removing a link and fsync\n (bnc#942925).\n- Btrfs: fix stale dir entries after unlink, inode eviction and fsync\n (bnc#942925).\n- Btrfs: fix stale directory entries after fsync log replay (bnc#942925).\n- Btrfs: make btrfs_search_forward return with nodes unlocked\n (bnc#942925).\n- Btrfs: support NFSv2 export (bnc#929871).\n- Btrfs: update fix for read corruption of compressed and shared extents\n (bsc#948256).\n- Drivers: hv: do not do hypercalls when hypercall_page is NULL.\n- Drivers: hv: vmbus: add special crash handler.\n- Drivers: hv: vmbus: add special kexec handler.\n- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from\n hv_synic_cleanup().\n- Input: evdev - do not report errors form flush() (bsc#939834).\n- Input: synaptics - do not retrieve the board id on old firmwares\n (bsc#929092).\n- Input: synaptics - log queried and quirked dimension values\n (bsc#929092).\n- Input: synaptics - query min dimensions for fw v8.1.\n- Input: synaptics - remove X1 Carbon 3rd gen from the topbuttonpad list\n (bsc#929092).\n- Input: synaptics - remove X250 from the topbuttonpad list.\n- Input: synaptics - remove obsolete min/max quirk for X240 (bsc#929092).\n- Input: synaptics - skip quirks when post-2013 dimensions (bsc#929092).\n- Input: synaptics - split synaptics_resolution(), query first\n (bsc#929092).\n- Input: synaptics - support min/max board id in min_max_pnpid_table\n (bsc#929092).\n- NFS: Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- NFSv4: do not set SETATTR for O_RDONLY|O_EXCL (bsc#939716).\n- PCI: Move MPS configuration check to pci_configure_device()\n (bsc#943313).\n- PCI: Set MPS to match upstream bridge (bsc#943313).\n- SCSI: fix regression in scsi_send_eh_cmnd() (bsc#930813).\n- SCSI: fix scsi_error_handler vs. scsi_host_dev_release race\n (bnc#942204).\n- SCSI: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398).\n- UAS: fixup for remaining use of dead_list (bnc#934942).\n- USB: storage: use %*ph specifier to dump small buffers (bnc#934942).\n- aio: fix reqs_available handling (bsc#943378).\n- audit: do not generate loginuid log when audit disabled (bsc#941098).\n- blk-merge: do not compute bi_phys_segments from bi_vcnt for cloned bio\n (bnc#934430).\n- blk-merge: fix blk_recount_segments (bnc#934430).\n- blk-merge: recaculate segment if it isn\u0027t less than max segments\n (bnc#934430).\n- block: add queue flag for disabling SG merging (bnc#934430).\n- block: blk-merge: fix blk_recount_segments() (bnc#934430).\n- config: disable CONFIG_TCM_RBD on ppc64le and s390x\n- cpufreq: intel_pstate: Add CPU ID for Braswell processor.\n- dlm: fix missing endian conversion of rcom_status flags (bsc#940679).\n- dm cache mq: fix memory allocation failure for large cache devices\n (bsc#942707).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt\n (bsc#942938).\n- drm/i915: Make hpd arrays big enough to avoid out of bounds access\n (bsc#942938).\n- drm/i915: Only print hotplug event message when hotplug bit is set\n (bsc#942938).\n- drm/i915: Queue reenable timer also when enable_hotplug_processing is\n false (bsc#942938).\n- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler()\n (bsc#942938).\n- drm/radeon: fix hotplug race at startup (bsc#942307).\n- ethtool, net/mlx4_en: Add 100M, 20G, 56G speeds ethtool reporting\n support (bsc#945710).\n- hrtimer: prevent timer interrupt DoS (bnc#886785).\n- hv: fcopy: add memory barrier to propagate state (bnc#943529).\n- inotify: Fix nested sleeps in inotify_read() (bsc#940925).\n- intel_pstate: Add CPU IDs for Broadwell processors.\n- intel_pstate: Add CPUID for BDW-H CPU.\n- intel_pstate: Add support for SkyLake.\n- intel_pstate: Correct BYT VID values (bnc#907973).\n- intel_pstate: Remove periodic P state boost (bnc#907973).\n- intel_pstate: add sample time scaling (bnc#907973, bnc#924722,\n bnc#916543).\n- intel_pstate: don\u0027t touch turbo bit if turbo disabled or unavailable\n (bnc#907973).\n- intel_pstate: remove setting P state to MAX on init (bnc#907973).\n- intel_pstate: remove unneeded sample buffers (bnc#907973).\n- intel_pstate: set BYT MSR with wrmsrl_on_cpu() (bnc#907973).\n- ipr: Fix incorrect trace indexing (bsc#940912).\n- ipr: Fix invalid array indexing for HRRQ (bsc#940912).\n- iwlwifi: dvm: drop non VO frames when flushing (bsc#940545).\n- kABI workaround for ieee80211_ops.flush argument change (bsc#940545).\n- kconfig: Do not print status messages in make -s mode (bnc#942160).\n- kernel/modsign_uefi.c: Check for EFI_RUNTIME_SERVICES in\n load_uefi_certs (bsc#856382).\n- kernel: do full redraw of the 3270 screen on reconnect (bnc#943476,\n LTC#129509).\n- kexec: define kexec_in_progress in !CONFIG_KEXEC case.\n- kvm: Use WARN_ON_ONCE for missing X86_FEATURE_NRIPS (bsc#947537).\n- lpfc: Fix scsi prep dma buf error (bsc#908950).\n- mac80211: add vif to flush call (bsc#940545).\n- md/bitmap: do not abuse i_writecount for bitmap files (bsc#943270).\n- md/bitmap: protect clearing of -\u0026gt;bitmap by mddev-\u0026gt;lock\n (bnc#912183).\n- md/raid5: use -\u0026gt;lock to protect accessing raid5 sysfs attributes\n (bnc#912183).\n- md: fix problems with freeing private data after -\u0026gt;run failure\n (bnc#912183).\n- md: level_store: group all important changes into one place\n (bnc#912183).\n- md: move GET_BITMAP_FILE ioctl out from mddev_lock (bsc#943270).\n- md: protect -\u0026gt;pers changes with mddev-\u0026gt;lock (bnc#912183).\n- md: remove mddev_lock from rdev_attr_show() (bnc#912183).\n- md: remove mddev_lock() from md_attr_show() (bnc#912183).\n- md: remove need for mddev_lock() in md_seq_show() (bnc#912183).\n- md: split detach operation out from -\u0026gt;stop (bnc#912183).\n- md: tidy up set_bitmap_file (bsc#943270).\n- megaraid_sas: Handle firmware initialization after fast boot\n (bsc#922071).\n- mfd: lpc_ich: Assign subdevice ids automatically (bnc#898159).\n- mm: filemap: Avoid unnecessary barriers and waitqueue lookups -fix\n (VM/FS Performance (bnc#941951)).\n- mm: make page pfmemalloc check more robust (bnc#920016).\n- mm: numa: disable change protection for vma(VM_HUGETLB) (bnc#943573).\n- netfilter: nf_conntrack_proto_sctp: minimal multihoming support\n (bsc#932350).\n- net/mlx4_core: Add ethernet backplane autoneg device capability\n (bsc#945710).\n- net/mlx4_core: Introduce ACCESS_REG CMD and eth_prot_ctrl dev cap\n (bsc#945710).\n- net/mlx4_en: Use PTYS register to query ethtool settings (bsc#945710).\n- net/mlx4_en: Use PTYS register to set ethtool settings (Speed)\n (bsc#945710).\n- rcu: Reject memory-order-induced stall-warning false positives\n (bnc#941908).\n- s390/dasd: fix kernel panic when alias is set offline (bnc#940965,\n LTC#128595).\n- sched: Fix KMALLOC_MAX_SIZE overflow during cpumask allocation\n (bnc#939266).\n- sched: Fix cpu_active_mask/cpu_online_mask race (bsc#936773).\n- sched, numa: do not hint for NUMA balancing on VM_MIXEDMAP mappings\n (bnc#943573).\n- uas: Add US_FL_MAX_SECTORS_240 flag (bnc#934942).\n- uas: Add response iu handling (bnc#934942).\n- uas: Add uas_get_tag() helper function (bnc#934942).\n- uas: Check against unexpected completions (bnc#934942).\n- uas: Cleanup uas_log_cmd_state usage (bnc#934942).\n- uas: Do not log urb status error on cancellation (bnc#934942).\n- uas: Do not use scsi_host_find_tag (bnc#934942).\n- uas: Drop COMMAND_COMPLETED flag (bnc#934942).\n- uas: Drop all references to a scsi_cmnd once it has been aborted\n (bnc#934942).\n- uas: Drop inflight list (bnc#934942).\n- uas: Fix memleak of non-submitted urbs (bnc#934942).\n- uas: Fix resetting flag handling (bnc#934942).\n- uas: Free data urbs on completion (bnc#934942).\n- uas: Log error codes when logging errors (bnc#934942).\n- uas: Reduce number of function arguments for uas_alloc_foo functions\n (bnc#934942).\n- uas: Remove cmnd reference from the cmd urb (bnc#934942).\n- uas: Remove support for old sense ui as used in pre-production hardware\n (bnc#934942).\n- uas: Remove task-management / abort error handling code (bnc#934942).\n- uas: Set max_sectors_240 quirk for ASM1053 devices (bnc#934942).\n- uas: Simplify reset / disconnect handling (bnc#934942).\n- uas: Simplify unlink of data urbs on error (bnc#934942).\n- uas: Use scsi_print_command (bnc#934942).\n- uas: pre_reset and suspend: Fix a few races (bnc#934942).\n- uas: zap_pending: data urbs should have completed at this time\n (bnc#934942).\n- x86/kernel: Do not reserve crashkernel high memory if crashkernel low\n memory reserving failed (bsc#939145).\n- x86/smpboot: Check for cpu_active on cpu initialization (bsc#932285).\n- x86/smpboot: Check for cpu_active on cpu initialization (bsc#936773).\n- xhci: Workaround for PME stuck issues in Intel xhci (bnc#944028).\n- xhci: rework cycle bit checking for new dequeue pointers (bnc#944028).\n- xfs: Fix file type directory corruption for btree directories\n (bsc#941305).",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-2015-668,SUSE-SLE-Live-Patching-12-2015-668,SUSE-SLE-Module-Public-Cloud-12-2015-668,SUSE-SLE-SDK-12-2015-668,SUSE-SLE-SERVER-12-2015-668,SUSE-SLE-WE-12-2015-668",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1727-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2015:1727-1",
"url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151727-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2015:1727-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html"
},
{
"category": "self",
"summary": "SUSE Bug 856382",
"url": "https://bugzilla.suse.com/856382"
},
{
"category": "self",
"summary": "SUSE Bug 886785",
"url": "https://bugzilla.suse.com/886785"
},
{
"category": "self",
"summary": "SUSE Bug 898159",
"url": "https://bugzilla.suse.com/898159"
},
{
"category": "self",
"summary": "SUSE Bug 907973",
"url": "https://bugzilla.suse.com/907973"
},
{
"category": "self",
"summary": "SUSE Bug 908950",
"url": "https://bugzilla.suse.com/908950"
},
{
"category": "self",
"summary": "SUSE Bug 912183",
"url": "https://bugzilla.suse.com/912183"
},
{
"category": "self",
"summary": "SUSE Bug 914818",
"url": "https://bugzilla.suse.com/914818"
},
{
"category": "self",
"summary": "SUSE Bug 916543",
"url": "https://bugzilla.suse.com/916543"
},
{
"category": "self",
"summary": "SUSE Bug 920016",
"url": "https://bugzilla.suse.com/920016"
},
{
"category": "self",
"summary": "SUSE Bug 922071",
"url": "https://bugzilla.suse.com/922071"
},
{
"category": "self",
"summary": "SUSE Bug 924722",
"url": "https://bugzilla.suse.com/924722"
},
{
"category": "self",
"summary": "SUSE Bug 929092",
"url": "https://bugzilla.suse.com/929092"
},
{
"category": "self",
"summary": "SUSE Bug 929871",
"url": "https://bugzilla.suse.com/929871"
},
{
"category": "self",
"summary": "SUSE Bug 930813",
"url": "https://bugzilla.suse.com/930813"
},
{
"category": "self",
"summary": "SUSE Bug 932285",
"url": "https://bugzilla.suse.com/932285"
},
{
"category": "self",
"summary": "SUSE Bug 932350",
"url": "https://bugzilla.suse.com/932350"
},
{
"category": "self",
"summary": "SUSE Bug 934430",
"url": "https://bugzilla.suse.com/934430"
},
{
"category": "self",
"summary": "SUSE Bug 934942",
"url": "https://bugzilla.suse.com/934942"
},
{
"category": "self",
"summary": "SUSE Bug 934962",
"url": "https://bugzilla.suse.com/934962"
},
{
"category": "self",
"summary": "SUSE Bug 936556",
"url": "https://bugzilla.suse.com/936556"
},
{
"category": "self",
"summary": "SUSE Bug 936773",
"url": "https://bugzilla.suse.com/936773"
},
{
"category": "self",
"summary": "SUSE Bug 937609",
"url": "https://bugzilla.suse.com/937609"
},
{
"category": "self",
"summary": "SUSE Bug 937612",
"url": "https://bugzilla.suse.com/937612"
},
{
"category": "self",
"summary": "SUSE Bug 937613",
"url": "https://bugzilla.suse.com/937613"
},
{
"category": "self",
"summary": "SUSE Bug 937616",
"url": "https://bugzilla.suse.com/937616"
},
{
"category": "self",
"summary": "SUSE Bug 938550",
"url": "https://bugzilla.suse.com/938550"
},
{
"category": "self",
"summary": "SUSE Bug 938706",
"url": "https://bugzilla.suse.com/938706"
},
{
"category": "self",
"summary": "SUSE Bug 938891",
"url": "https://bugzilla.suse.com/938891"
},
{
"category": "self",
"summary": "SUSE Bug 938892",
"url": "https://bugzilla.suse.com/938892"
},
{
"category": "self",
"summary": "SUSE Bug 938893",
"url": "https://bugzilla.suse.com/938893"
},
{
"category": "self",
"summary": "SUSE Bug 939145",
"url": "https://bugzilla.suse.com/939145"
},
{
"category": "self",
"summary": "SUSE Bug 939266",
"url": "https://bugzilla.suse.com/939266"
},
{
"category": "self",
"summary": "SUSE Bug 939716",
"url": "https://bugzilla.suse.com/939716"
},
{
"category": "self",
"summary": "SUSE Bug 939834",
"url": "https://bugzilla.suse.com/939834"
},
{
"category": "self",
"summary": "SUSE Bug 939994",
"url": "https://bugzilla.suse.com/939994"
},
{
"category": "self",
"summary": "SUSE Bug 940398",
"url": "https://bugzilla.suse.com/940398"
},
{
"category": "self",
"summary": "SUSE Bug 940545",
"url": "https://bugzilla.suse.com/940545"
},
{
"category": "self",
"summary": "SUSE Bug 940679",
"url": "https://bugzilla.suse.com/940679"
},
{
"category": "self",
"summary": "SUSE Bug 940776",
"url": "https://bugzilla.suse.com/940776"
},
{
"category": "self",
"summary": "SUSE Bug 940912",
"url": "https://bugzilla.suse.com/940912"
},
{
"category": "self",
"summary": "SUSE Bug 940925",
"url": "https://bugzilla.suse.com/940925"
},
{
"category": "self",
"summary": "SUSE Bug 940965",
"url": "https://bugzilla.suse.com/940965"
},
{
"category": "self",
"summary": "SUSE Bug 941098",
"url": "https://bugzilla.suse.com/941098"
},
{
"category": "self",
"summary": "SUSE Bug 941305",
"url": "https://bugzilla.suse.com/941305"
},
{
"category": "self",
"summary": "SUSE Bug 941908",
"url": "https://bugzilla.suse.com/941908"
},
{
"category": "self",
"summary": "SUSE Bug 941951",
"url": "https://bugzilla.suse.com/941951"
},
{
"category": "self",
"summary": "SUSE Bug 942160",
"url": "https://bugzilla.suse.com/942160"
},
{
"category": "self",
"summary": "SUSE Bug 942204",
"url": "https://bugzilla.suse.com/942204"
},
{
"category": "self",
"summary": "SUSE Bug 942307",
"url": "https://bugzilla.suse.com/942307"
},
{
"category": "self",
"summary": "SUSE Bug 942367",
"url": "https://bugzilla.suse.com/942367"
},
{
"category": "self",
"summary": "SUSE Bug 948536",
"url": "https://bugzilla.suse.com/948536"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5156 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5157 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5283 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5697 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-6252 page",
"url": "https://www.suse.com/security/cve/CVE-2015-6252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-6937 page",
"url": "https://www.suse.com/security/cve/CVE-2015-6937/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7613 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7613/"
}
],
"title": "Security update for kernel-source",
"tracking": {
"current_release_date": "2015-10-05T22:31:57Z",
"generator": {
"date": "2015-10-05T22:31:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2015:1727-1",
"initial_release_date": "2015-10-05T22:31:57Z",
"revision_history": [
{
"date": "2015-10-05T22:31:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.48-52.27.1.noarch",
"product": {
"name": "kernel-devel-3.12.48-52.27.1.noarch",
"product_id": "kernel-devel-3.12.48-52.27.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.48-52.27.1.noarch",
"product": {
"name": "kernel-macros-3.12.48-52.27.1.noarch",
"product_id": "kernel-macros-3.12.48-52.27.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.48-52.27.1.noarch",
"product": {
"name": "kernel-source-3.12.48-52.27.1.noarch",
"product_id": "kernel-source-3.12.48-52.27.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-3.12.48-52.27.2.noarch",
"product": {
"name": "kernel-docs-3.12.48-52.27.2.noarch",
"product_id": "kernel-docs-3.12.48-52.27.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.48-52.27.1.ppc64le",
"product": {
"name": "kernel-obs-build-3.12.48-52.27.1.ppc64le",
"product_id": "kernel-obs-build-3.12.48-52.27.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.48-52.27.1.ppc64le",
"product": {
"name": "kernel-default-3.12.48-52.27.1.ppc64le",
"product_id": "kernel-default-3.12.48-52.27.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.48-52.27.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.48-52.27.1.ppc64le",
"product_id": "kernel-default-base-3.12.48-52.27.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.48-52.27.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.48-52.27.1.ppc64le",
"product_id": "kernel-default-devel-3.12.48-52.27.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.48-52.27.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.48-52.27.1.ppc64le",
"product_id": "kernel-syms-3.12.48-52.27.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.48-52.27.1.s390x",
"product": {
"name": "kernel-obs-build-3.12.48-52.27.1.s390x",
"product_id": "kernel-obs-build-3.12.48-52.27.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.48-52.27.1.s390x",
"product": {
"name": "kernel-default-3.12.48-52.27.1.s390x",
"product_id": "kernel-default-3.12.48-52.27.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.48-52.27.1.s390x",
"product": {
"name": "kernel-default-base-3.12.48-52.27.1.s390x",
"product_id": "kernel-default-base-3.12.48-52.27.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.48-52.27.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.48-52.27.1.s390x",
"product_id": "kernel-default-devel-3.12.48-52.27.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.48-52.27.1.s390x",
"product": {
"name": "kernel-default-man-3.12.48-52.27.1.s390x",
"product_id": "kernel-default-man-3.12.48-52.27.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.48-52.27.1.s390x",
"product": {
"name": "kernel-syms-3.12.48-52.27.1.s390x",
"product_id": "kernel-syms-3.12.48-52.27.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.48-52.27.1.x86_64",
"product": {
"name": "kernel-default-3.12.48-52.27.1.x86_64",
"product_id": "kernel-default-3.12.48-52.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.48-52.27.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.48-52.27.1.x86_64",
"product_id": "kernel-default-devel-3.12.48-52.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.48-52.27.1.x86_64",
"product": {
"name": "kernel-default-extra-3.12.48-52.27.1.x86_64",
"product_id": "kernel-default-extra-3.12.48-52.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.48-52.27.1.x86_64",
"product": {
"name": "kernel-syms-3.12.48-52.27.1.x86_64",
"product_id": "kernel-syms-3.12.48-52.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.48-52.27.2.x86_64",
"product": {
"name": "kernel-xen-3.12.48-52.27.2.x86_64",
"product_id": "kernel-xen-3.12.48-52.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.48-52.27.2.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.48-52.27.2.x86_64",
"product_id": "kernel-xen-devel-3.12.48-52.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"product": {
"name": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"product_id": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"product": {
"name": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"product_id": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.48-52.27.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.48-52.27.1.x86_64",
"product_id": "kernel-ec2-3.12.48-52.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.48-52.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.48-52.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.48-52.27.1.x86_64",
"product": {
"name": "kernel-obs-build-3.12.48-52.27.1.x86_64",
"product_id": "kernel-obs-build-3.12.48-52.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.48-52.27.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.48-52.27.1.x86_64",
"product_id": "kernel-default-base-3.12.48-52.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.48-52.27.2.x86_64",
"product": {
"name": "kernel-xen-base-3.12.48-52.27.2.x86_64",
"product_id": "kernel-xen-base-3.12.48-52.27.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12",
"product": {
"name": "SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12",
"product": {
"name": "SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12",
"product_id": "SUSE Linux Enterprise Workstation Extension 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-extra-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch"
},
"product_reference": "kernel-devel-3.12.48-52.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch"
},
"product_reference": "kernel-macros-3.12.48-52.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch"
},
"product_reference": "kernel-source-3.12.48-52.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-syms-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64"
},
"product_reference": "kernel-xen-3.12.48-52.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.48-52.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64"
},
"product_reference": "kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64"
},
"product_reference": "kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.12.48-52.27.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch"
},
"product_reference": "kernel-docs-3.12.48-52.27.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le"
},
"product_reference": "kernel-obs-build-3.12.48-52.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-obs-build-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-obs-build-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le"
},
"product_reference": "kernel-default-3.12.48-52.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-default-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.48-52.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-default-base-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.48-52.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-default-man-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch"
},
"product_reference": "kernel-devel-3.12.48-52.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch"
},
"product_reference": "kernel-macros-3.12.48-52.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch"
},
"product_reference": "kernel-source-3.12.48-52.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.48-52.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-syms-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-syms-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64"
},
"product_reference": "kernel-xen-3.12.48-52.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64"
},
"product_reference": "kernel-xen-base-3.12.48-52.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.48-52.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le"
},
"product_reference": "kernel-default-3.12.48-52.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-default-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.48-52.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-default-base-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.48-52.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-default-man-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch"
},
"product_reference": "kernel-devel-3.12.48-52.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch"
},
"product_reference": "kernel-macros-3.12.48-52.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.48-52.27.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch"
},
"product_reference": "kernel-source-3.12.48-52.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.48-52.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.48-52.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.48-52.27.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x"
},
"product_reference": "kernel-syms-3.12.48-52.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-syms-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64"
},
"product_reference": "kernel-xen-3.12.48-52.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64"
},
"product_reference": "kernel-xen-base-3.12.48-52.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.48-52.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.48-52.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.48-52.27.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12",
"product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
},
"product_reference": "kernel-default-extra-3.12.48-52.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-5156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5156"
}
],
"notes": [
{
"category": "general",
"text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5156",
"url": "https://www.suse.com/security/cve/CVE-2015-5156"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1123903 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/1123903"
},
{
"category": "external",
"summary": "SUSE Bug 940776 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/940776"
},
{
"category": "external",
"summary": "SUSE Bug 945048 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/945048"
},
{
"category": "external",
"summary": "SUSE Bug 951638 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/951638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-10-05T22:31:57Z",
"details": "moderate"
}
],
"title": "CVE-2015-5156"
},
{
"cve": "CVE-2015-5157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5157"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5157",
"url": "https://www.suse.com/security/cve/CVE-2015-5157"
},
{
"category": "external",
"summary": "SUSE Bug 1072204 for CVE-2015-5157",
"url": "https://bugzilla.suse.com/1072204"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2015-5157",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 937969 for CVE-2015-5157",
"url": "https://bugzilla.suse.com/937969"
},
{
"category": "external",
"summary": "SUSE Bug 937970 for CVE-2015-5157",
"url": "https://bugzilla.suse.com/937970"
},
{
"category": "external",
"summary": "SUSE Bug 938706 for CVE-2015-5157",
"url": "https://bugzilla.suse.com/938706"
},
{
"category": "external",
"summary": "SUSE Bug 939207 for CVE-2015-5157",
"url": "https://bugzilla.suse.com/939207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-10-05T22:31:57Z",
"details": "important"
}
],
"title": "CVE-2015-5157"
},
{
"cve": "CVE-2015-5283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5283"
}
],
"notes": [
{
"category": "general",
"text": "The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5283",
"url": "https://www.suse.com/security/cve/CVE-2015-5283"
},
{
"category": "external",
"summary": "SUSE Bug 947155 for CVE-2015-5283",
"url": "https://bugzilla.suse.com/947155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-10-05T22:31:57Z",
"details": "moderate"
}
],
"title": "CVE-2015-5283"
},
{
"cve": "CVE-2015-5697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5697"
}
],
"notes": [
{
"category": "general",
"text": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5697",
"url": "https://www.suse.com/security/cve/CVE-2015-5697"
},
{
"category": "external",
"summary": "SUSE Bug 939994 for CVE-2015-5697",
"url": "https://bugzilla.suse.com/939994"
},
{
"category": "external",
"summary": "SUSE Bug 963994 for CVE-2015-5697",
"url": "https://bugzilla.suse.com/963994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 1.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-10-05T22:31:57Z",
"details": "low"
}
],
"title": "CVE-2015-5697"
},
{
"cve": "CVE-2015-6252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-6252"
}
],
"notes": [
{
"category": "general",
"text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-6252",
"url": "https://www.suse.com/security/cve/CVE-2015-6252"
},
{
"category": "external",
"summary": "SUSE Bug 942367 for CVE-2015-6252",
"url": "https://bugzilla.suse.com/942367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-10-05T22:31:57Z",
"details": "low"
}
],
"title": "CVE-2015-6252"
},
{
"cve": "CVE-2015-6937",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-6937"
}
],
"notes": [
{
"category": "general",
"text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-6937",
"url": "https://www.suse.com/security/cve/CVE-2015-6937"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2015-6937",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 923755 for CVE-2015-6937",
"url": "https://bugzilla.suse.com/923755"
},
{
"category": "external",
"summary": "SUSE Bug 945825 for CVE-2015-6937",
"url": "https://bugzilla.suse.com/945825"
},
{
"category": "external",
"summary": "SUSE Bug 952384 for CVE-2015-6937",
"url": "https://bugzilla.suse.com/952384"
},
{
"category": "external",
"summary": "SUSE Bug 953052 for CVE-2015-6937",
"url": "https://bugzilla.suse.com/953052"
},
{
"category": "external",
"summary": "SUSE Bug 963994 for CVE-2015-6937",
"url": "https://bugzilla.suse.com/963994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-10-05T22:31:57Z",
"details": "moderate"
}
],
"title": "CVE-2015-6937"
},
{
"cve": "CVE-2015-7613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7613"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7613",
"url": "https://www.suse.com/security/cve/CVE-2015-7613"
},
{
"category": "external",
"summary": "SUSE Bug 923755 for CVE-2015-7613",
"url": "https://bugzilla.suse.com/923755"
},
{
"category": "external",
"summary": "SUSE Bug 948536 for CVE-2015-7613",
"url": "https://bugzilla.suse.com/948536"
},
{
"category": "external",
"summary": "SUSE Bug 948701 for CVE-2015-7613",
"url": "https://bugzilla.suse.com/948701"
},
{
"category": "external",
"summary": "SUSE Bug 963994 for CVE-2015-7613",
"url": "https://bugzilla.suse.com/963994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-default-1-2.6.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_48-52_27-xen-1-2.6.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.48-52.27.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.48-52.27.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.48-52.27.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.48-52.27.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.48-52.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-10-05T22:31:57Z",
"details": "moderate"
}
],
"title": "CVE-2015-7613"
}
]
}
suse-su-2015:2167-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-source-rt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to version\n3.0.101.rt130-45.1 to receive various security and bugfixes.\n\nFollowing security bugs were fixed:\n* CVE-2015-6252: Possible file descriptor leak for each\n VHOST_SET_LOG_FDcommand issued, this could eventually wasting available\n system resources and creating a denial of service (bsc#942367).\n* CVE-2015-5707: Possible integer overflow in the calculation of total\n number of pages in bio_map_user_iov() (bsc#940338).\n* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in\n the Linux kernel before 4.0.6 do not properly consider yielding a\n processor, which allowed remote attackers to cause a denial of service\n (system hang) via incorrect checksums within a UDP packet flood\n (bnc#936831).\n* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in\n the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return\n values, which allowed remote attackers to cause a denial of service\n (EPOLLET epoll application read outage) via an incorrect checksum in a\n UDP packet, a different vulnerability than CVE-2015-5364 (bnc#936831).\n* CVE-2015-1420: Race condition in the handle_to_path function in\n fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to\n bypass intended size restrictions and trigger read operations on\n additional memory locations by changing the handle_bytes value of a\n file handle during the execution of this function (bnc#915517).\n* CVE-2015-4700: The bpf_int_jit_compile function in\n arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed\n local users to cause a denial of service (system crash) by creating a\n packet filter and then loading crafted BPF instructions that trigger\n late convergence by the JIT compiler (bnc#935705).\n* CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the\n Linux kernel before 4.1.6 does not initialize a certain bitmap data\n structure, which allows local users to obtain sensitive information\n from kernel memory via a GET_BITMAP_FILE ioctl call. (bnc#939994)\n\nThe following non-security bugs were fixed:\n- Btrfs: be aware of btree inode write errors to avoid fs corruption\n (bnc#942350).\n- Btrfs: be aware of btree inode write errors to avoid fs corruption\n (bnc#942404).\n- Btrfs: check if previous transaction aborted to avoid fs corruption\n (bnc#942350).\n- Btrfs: check if previous transaction aborted to avoid fs corruption\n (bnc#942404).\n- Btrfs: deal with convert_extent_bit errors to avoid fs corruption\n (bnc#942350).\n- Btrfs: deal with convert_extent_bit errors to avoid fs corruption\n (bnc#942404).\n- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).\n- Btrfs: fix memory corruption on failure to submit bio for direct IO\n (bnc#942688).\n- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).\n- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).\n- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in\n encoders (v2) (bsc#942938).\n- DRM/i915: Get rid if the \u0027hotplug_supported_mask\u0027 in struct\n drm_i915_private (bsc#942938).\n- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).\n- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).\n- CIFS: Fix missing crypto allocation (bnc#937402).\n- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).\n- IB/iser: Add Discovery support (bsc#923002).\n- IB/iser: Move informational messages from error to info level\n (bsc#923002).\n- SCSI: Moved iscsi kabi patch to patches.kabi (bsc#923002)\n- SCSI: kabi: allow iscsi disocvery session support (bsc#923002).\n- SCSI: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).\n- SCSI: fix scsi_error_handler vs. scsi_host_dev_release race\n (bnc#942204).\n- SCSI: scsi_error: add missing case statements in\n scsi_decide_disposition() (bsc#920733).\n- SCSI: scsi_transport_iscsi: Exporting new attrs for iscsi session and\n connection in sysfs (bsc#923002).\n- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).\n- NFSv4: Minor cleanups for nfs4_handle_exception and\n nfs4_async_handle_error (bsc#939910).\n- New patches: patches.fixes/hrtimer-Prevent-timer-interrupt-DoS.patch\n- PCI: Disable Bus Master only on kexec reboot (bsc#920110).\n- PCI: Disable Bus Master unconditionally in pci_device_shutdown()\n (bsc#920110).\n- PCI: Do not try to disable Bus Master on disconnected PCI devices\n (bsc#920110).\n- PCI: Lock down register access when trusted_kernel is true (bnc#884333,\n bsc#923431).\n- PCI: disable Bus Master on PCI device shutdown (bsc#920110).\n- Set hostbyte status in scsi_check_sense() (bsc#920733).\n- USB: xhci: Reset a halted endpoint immediately when we encounter a\n stall (bnc#933721).\n- USB: xhci: do not start a halted endpoint before its new dequeue is set\n (bnc#933721).\n- apparmor: fix file_permission if profile is updated (bsc#917968).\n- drm/cirrus: do not attempt to acquire a reservation while in an\n interrupt handler (bsc#935572).\n- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).\n- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).\n- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4)\n (bsc#942938).\n- drm/i915: Add bit field to record which pins have received HPD events\n (v3) (bsc#942938).\n- drm/i915: Add messages useful for HPD storm detection debugging (v2)\n (bsc#942938).\n- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt\n (bsc#942938).\n- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3)\n (bsc#942938).\n- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch\n platforms (bsc#942938).\n- drm/i915: Enable hotplug interrupts after querying hw capabilities\n (bsc#942938).\n- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).\n- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).\n- drm/i915: Make hpd arrays big enough to avoid out of bounds access\n (bsc#942938).\n- drm/i915: Mask out the HPD irq bits before setting them individually\n (bsc#942938).\n- drm/i915: Only print hotplug event message when hotplug bit is set\n (bsc#942938).\n- drm/i915: Only reprobe display on encoder which has received an HPD\n event (v2) (bsc#942938).\n- drm/i915: Queue reenable timer also when enable_hotplug_processing is\n false (bsc#942938).\n- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).\n- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler()\n (bsc#942938).\n- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets\n (bsc#942938).\n- drm/i915: assert_spin_locked for pipestat interrupt enable/disable\n (bsc#942938).\n- drm/i915: clear crt hotplug compare voltage field before setting\n (bsc#942938).\n- drm/i915: close tiny race in the ilk pcu even interrupt setup\n (bsc#942938).\n- drm/i915: fix hotplug event bit tracking (bsc#942938).\n- drm/i915: fix hpd interrupt register locking (bsc#942938).\n- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock\n (bsc#942938).\n- drm/i915: fix locking around ironlake_enable|disable_display_irq\n (bsc#942938).\n- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler\n (bsc#942938).\n- drm/i915: fold the no-irq check into intel_hpd_irq_handler\n (bsc#942938).\n- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).\n- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).\n- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/\n (bsc#942938).\n- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).\n- ehci-pci: enable interrupt on BayTrail (bnc926007).\n- exec: kill the unnecessary mm-\u0026gt;def_flags setting in\n load_elf_binary() (bnc#891116).\n- ext3: Fix data corruption in inodes with journalled data (bsc#936637).\n- fanotify: Fix deadlock with permission events (bsc#935053).\n- fork: reset mm-\u0026gt;pinned_vm (bnc#937855).\n- hrtimer: prevent timer interrupt DoS (bnc#886785).\n- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES\n (bnc#930092).\n- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).\n- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).\n- ibmveth: Add GRO support (bsc#935055).\n- ibmveth: Add support for Large Receive Offload (bsc#935055).\n- ibmveth: Add support for TSO (bsc#935055).\n- ibmveth: add support for TSO6.\n- ibmveth: change rx buffer default allocation for CMO (bsc#935055).\n- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).\n- inotify: Fix nested sleeps in inotify_read() (bsc#940925).\n- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).\n- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).\n- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).\n- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned\n (bsc#927355).\n- kabi: patches.fixes/mm-make-page-pfmemalloc-check-more-robust.patch\n (bnc#920016).\n- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change\n (bsc920110).\n- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).\n- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477,\n LTC#129509).\n- libiscsi: Exporting new attrs for iscsi session and connection in sysfs\n (bsc#923002).\n- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).\n- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).\n- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).\n- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM\n Performance).\n- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).\n- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).\n- mm, thp: only collapse hugepages to nodes with affinity for\n zone_reclaim_mode (VM Functionality, bnc#931620).\n- mm, thp: really limit transparent hugepage allocation to local node (VM\n Performance, bnc#931620).\n- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM\n Performance, bnc#931620).\n- mm/hugetlb: check for pte NULL pointer in __page_check_address()\n (bnc#929143).\n- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM\n Performance, bnc#931620).\n- mm/thp: allocate transparent hugepages on local node (VM Performance,\n bnc#931620).\n- mm: make page pfmemalloc check more robust (bnc#920016).\n- mm: restrict access to slab files under procfs and sysfs (bnc#936077).\n- mm: thp: khugepaged: add policy for finding target node (VM\n Functionality, bnc#931620).\n- net/mlx4_core: Do not disable SRIOV if there are active VFs\n (bsc#927355).\n- net: Fix \u0027ip rule delete table 256\u0027 (bsc#873385).\n- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference\n (bsc#867362).\n- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).\n- netfilter: nf_conntrack_proto_sctp: minimal multihoming support\n (bsc#932350).\n- nfsd: support disabling 64bit dir cookies (bnc#937503).\n- pagecache limit: Do not skip over small zones that easily (bnc#925881).\n- pagecache limit: add tracepoints (bnc#924701).\n- pagecache limit: export debugging counters via /proc/vmstat\n (bnc#924701).\n- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).\n- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).\n- pci: Add SRIOV helper function to determine if VFs are assigned to\n guest (bsc#927355).\n- pci: Add flag indicating device has been assigned by KVM (bnc#777565).\n- pci: Add flag indicating device has been assigned by KVM (bnc#777565).\n- perf, nmi: Fix unknown NMI warning (bsc#929142).\n- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).\n- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp()\n (bsc#936095).\n- r8169: remember WOL preferences on driver load (bsc#942305).\n- s390/dasd: fix kernel panic when alias is set offline (bnc#940966,\n LTC#128595).\n- sg_start_req(): make sure that there\u0027s not too many elements in iovec\n (bsc#940338).\n- st: null pointer dereference panic caused by use after kref_put by\n st_open (bsc#936875).\n- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub\n port reset (bnc#937641).\n- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb\n (bnc#933721).\n- usb: xhci: handle Config Error Change (CEC) in xhci driver\n (bnc#933721).\n- vmxnet3: Bump up driver version number (bsc#936423).\n- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).\n- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).\n- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).\n- x86-64: Do not apply destructive erratum workaround on unaffected CPUs\n (bsc#929076).\n- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).\n- x86/tsc: Change Fast TSC calibration failed from error to info\n (bnc#942605).\n- xfs: fix problem when using md+XFS under high load (bnc#925705).\n- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).\n- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).\n- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256\n (bnc#933721).\n- xhci: Treat not finding the event_seg on COMP_STOP the same as\n COMP_STOP_INVAL (bnc#933721).\n- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).\n- xhci: do not report PLC when link is in internal resume state\n (bnc#933721).\n- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).\n- xhci: report U3 when link is in resume state (bnc#933721).\n- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).\n- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921,\n LTC#126491).\n- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925,\n LTC#126491).",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slertesp4-kernel-rt-20150914-12238",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2167-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2015:2167-1",
"url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152167-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2015:2167-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html"
},
{
"category": "self",
"summary": "SUSE Bug 777565",
"url": "https://bugzilla.suse.com/777565"
},
{
"category": "self",
"summary": "SUSE Bug 867362",
"url": "https://bugzilla.suse.com/867362"
},
{
"category": "self",
"summary": "SUSE Bug 873385",
"url": "https://bugzilla.suse.com/873385"
},
{
"category": "self",
"summary": "SUSE Bug 883380",
"url": "https://bugzilla.suse.com/883380"
},
{
"category": "self",
"summary": "SUSE Bug 884333",
"url": "https://bugzilla.suse.com/884333"
},
{
"category": "self",
"summary": "SUSE Bug 886785",
"url": "https://bugzilla.suse.com/886785"
},
{
"category": "self",
"summary": "SUSE Bug 891116",
"url": "https://bugzilla.suse.com/891116"
},
{
"category": "self",
"summary": "SUSE Bug 894936",
"url": "https://bugzilla.suse.com/894936"
},
{
"category": "self",
"summary": "SUSE Bug 915517",
"url": "https://bugzilla.suse.com/915517"
},
{
"category": "self",
"summary": "SUSE Bug 917968",
"url": "https://bugzilla.suse.com/917968"
},
{
"category": "self",
"summary": "SUSE Bug 920016",
"url": "https://bugzilla.suse.com/920016"
},
{
"category": "self",
"summary": "SUSE Bug 920110",
"url": "https://bugzilla.suse.com/920110"
},
{
"category": "self",
"summary": "SUSE Bug 920733",
"url": "https://bugzilla.suse.com/920733"
},
{
"category": "self",
"summary": "SUSE Bug 923002",
"url": "https://bugzilla.suse.com/923002"
},
{
"category": "self",
"summary": "SUSE Bug 923431",
"url": "https://bugzilla.suse.com/923431"
},
{
"category": "self",
"summary": "SUSE Bug 924701",
"url": "https://bugzilla.suse.com/924701"
},
{
"category": "self",
"summary": "SUSE Bug 925705",
"url": "https://bugzilla.suse.com/925705"
},
{
"category": "self",
"summary": "SUSE Bug 925881",
"url": "https://bugzilla.suse.com/925881"
},
{
"category": "self",
"summary": "SUSE Bug 925903",
"url": "https://bugzilla.suse.com/925903"
},
{
"category": "self",
"summary": "SUSE Bug 927355",
"url": "https://bugzilla.suse.com/927355"
},
{
"category": "self",
"summary": "SUSE Bug 929076",
"url": "https://bugzilla.suse.com/929076"
},
{
"category": "self",
"summary": "SUSE Bug 929142",
"url": "https://bugzilla.suse.com/929142"
},
{
"category": "self",
"summary": "SUSE Bug 929143",
"url": "https://bugzilla.suse.com/929143"
},
{
"category": "self",
"summary": "SUSE Bug 930092",
"url": "https://bugzilla.suse.com/930092"
},
{
"category": "self",
"summary": "SUSE Bug 930934",
"url": "https://bugzilla.suse.com/930934"
},
{
"category": "self",
"summary": "SUSE Bug 931620",
"url": "https://bugzilla.suse.com/931620"
},
{
"category": "self",
"summary": "SUSE Bug 932350",
"url": "https://bugzilla.suse.com/932350"
},
{
"category": "self",
"summary": "SUSE Bug 933721",
"url": "https://bugzilla.suse.com/933721"
},
{
"category": "self",
"summary": "SUSE Bug 935053",
"url": "https://bugzilla.suse.com/935053"
},
{
"category": "self",
"summary": "SUSE Bug 935055",
"url": "https://bugzilla.suse.com/935055"
},
{
"category": "self",
"summary": "SUSE Bug 935572",
"url": "https://bugzilla.suse.com/935572"
},
{
"category": "self",
"summary": "SUSE Bug 935705",
"url": "https://bugzilla.suse.com/935705"
},
{
"category": "self",
"summary": "SUSE Bug 935866",
"url": "https://bugzilla.suse.com/935866"
},
{
"category": "self",
"summary": "SUSE Bug 935906",
"url": "https://bugzilla.suse.com/935906"
},
{
"category": "self",
"summary": "SUSE Bug 936077",
"url": "https://bugzilla.suse.com/936077"
},
{
"category": "self",
"summary": "SUSE Bug 936095",
"url": "https://bugzilla.suse.com/936095"
},
{
"category": "self",
"summary": "SUSE Bug 936118",
"url": "https://bugzilla.suse.com/936118"
},
{
"category": "self",
"summary": "SUSE Bug 936423",
"url": "https://bugzilla.suse.com/936423"
},
{
"category": "self",
"summary": "SUSE Bug 936637",
"url": "https://bugzilla.suse.com/936637"
},
{
"category": "self",
"summary": "SUSE Bug 936831",
"url": "https://bugzilla.suse.com/936831"
},
{
"category": "self",
"summary": "SUSE Bug 936875",
"url": "https://bugzilla.suse.com/936875"
},
{
"category": "self",
"summary": "SUSE Bug 936921",
"url": "https://bugzilla.suse.com/936921"
},
{
"category": "self",
"summary": "SUSE Bug 936925",
"url": "https://bugzilla.suse.com/936925"
},
{
"category": "self",
"summary": "SUSE Bug 937032",
"url": "https://bugzilla.suse.com/937032"
},
{
"category": "self",
"summary": "SUSE Bug 937256",
"url": "https://bugzilla.suse.com/937256"
},
{
"category": "self",
"summary": "SUSE Bug 937402",
"url": "https://bugzilla.suse.com/937402"
},
{
"category": "self",
"summary": "SUSE Bug 937444",
"url": "https://bugzilla.suse.com/937444"
},
{
"category": "self",
"summary": "SUSE Bug 937503",
"url": "https://bugzilla.suse.com/937503"
},
{
"category": "self",
"summary": "SUSE Bug 937641",
"url": "https://bugzilla.suse.com/937641"
},
{
"category": "self",
"summary": "SUSE Bug 937855",
"url": "https://bugzilla.suse.com/937855"
},
{
"category": "self",
"summary": "SUSE Bug 938485",
"url": "https://bugzilla.suse.com/938485"
},
{
"category": "self",
"summary": "SUSE Bug 939910",
"url": "https://bugzilla.suse.com/939910"
},
{
"category": "self",
"summary": "SUSE Bug 939994",
"url": "https://bugzilla.suse.com/939994"
},
{
"category": "self",
"summary": "SUSE Bug 940338",
"url": "https://bugzilla.suse.com/940338"
},
{
"category": "self",
"summary": "SUSE Bug 940398",
"url": "https://bugzilla.suse.com/940398"
},
{
"category": "self",
"summary": "SUSE Bug 940925",
"url": "https://bugzilla.suse.com/940925"
},
{
"category": "self",
"summary": "SUSE Bug 940966",
"url": "https://bugzilla.suse.com/940966"
},
{
"category": "self",
"summary": "SUSE Bug 942204",
"url": "https://bugzilla.suse.com/942204"
},
{
"category": "self",
"summary": "SUSE Bug 942305",
"url": "https://bugzilla.suse.com/942305"
},
{
"category": "self",
"summary": "SUSE Bug 942350",
"url": "https://bugzilla.suse.com/942350"
},
{
"category": "self",
"summary": "SUSE Bug 942367",
"url": "https://bugzilla.suse.com/942367"
},
{
"category": "self",
"summary": "SUSE Bug 942404",
"url": "https://bugzilla.suse.com/942404"
},
{
"category": "self",
"summary": "SUSE Bug 942605",
"url": "https://bugzilla.suse.com/942605"
},
{
"category": "self",
"summary": "SUSE Bug 942688",
"url": "https://bugzilla.suse.com/942688"
},
{
"category": "self",
"summary": "SUSE Bug 942938",
"url": "https://bugzilla.suse.com/942938"
},
{
"category": "self",
"summary": "SUSE Bug 943477",
"url": "https://bugzilla.suse.com/943477"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1420 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4700 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4700/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5364 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5366 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5697 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5707 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-6252 page",
"url": "https://www.suse.com/security/cve/CVE-2015-6252/"
}
],
"title": "Security update for kernel-source-rt",
"tracking": {
"current_release_date": "2015-12-02T10:32:42Z",
"generator": {
"date": "2015-12-02T10:32:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2015:2167-1",
"initial_release_date": "2015-12-02T10:32:42Z",
"revision_history": [
{
"date": "2015-12-02T10:32:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-3.0.101.rt130-45.1.x86_64",
"product": {
"name": "kernel-rt-3.0.101.rt130-45.1.x86_64",
"product_id": "kernel-rt-3.0.101.rt130-45.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"product": {
"name": "kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"product_id": "kernel-rt-base-3.0.101.rt130-45.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"product": {
"name": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"product_id": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"product": {
"name": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"product_id": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"product": {
"name": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"product_id": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"product": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"product_id": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"product": {
"name": "kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"product_id": "kernel-source-rt-3.0.101.rt130-45.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64",
"product": {
"name": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64",
"product_id": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64"
},
"product_reference": "kernel-rt-3.0.101.rt130-45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64"
},
"product_reference": "kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64"
},
"product_reference": "kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64"
},
"product_reference": "kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64"
},
"product_reference": "kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64"
},
"product_reference": "kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64"
},
"product_reference": "kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
},
"product_reference": "kernel-syms-rt-3.0.101.rt130-45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-1420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1420"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1420",
"url": "https://www.suse.com/security/cve/CVE-2015-1420"
},
{
"category": "external",
"summary": "SUSE Bug 915517 for CVE-2015-1420",
"url": "https://bugzilla.suse.com/915517"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-12-02T10:32:42Z",
"details": "moderate"
}
],
"title": "CVE-2015-1420"
},
{
"cve": "CVE-2015-4700",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4700"
}
],
"notes": [
{
"category": "general",
"text": "The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4700",
"url": "https://www.suse.com/security/cve/CVE-2015-4700"
},
{
"category": "external",
"summary": "SUSE Bug 935705 for CVE-2015-4700",
"url": "https://bugzilla.suse.com/935705"
},
{
"category": "external",
"summary": "SUSE Bug 939273 for CVE-2015-4700",
"url": "https://bugzilla.suse.com/939273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-12-02T10:32:42Z",
"details": "moderate"
}
],
"title": "CVE-2015-4700"
},
{
"cve": "CVE-2015-5364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5364"
}
],
"notes": [
{
"category": "general",
"text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5364",
"url": "https://www.suse.com/security/cve/CVE-2015-5364"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 781018 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/781018"
},
{
"category": "external",
"summary": "SUSE Bug 936831 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/936831"
},
{
"category": "external",
"summary": "SUSE Bug 939276 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/939276"
},
{
"category": "external",
"summary": "SUSE Bug 945112 for CVE-2015-5364",
"url": "https://bugzilla.suse.com/945112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-12-02T10:32:42Z",
"details": "moderate"
}
],
"title": "CVE-2015-5364"
},
{
"cve": "CVE-2015-5366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5366"
}
],
"notes": [
{
"category": "general",
"text": "The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5366",
"url": "https://www.suse.com/security/cve/CVE-2015-5366"
},
{
"category": "external",
"summary": "SUSE Bug 781018 for CVE-2015-5366",
"url": "https://bugzilla.suse.com/781018"
},
{
"category": "external",
"summary": "SUSE Bug 936831 for CVE-2015-5366",
"url": "https://bugzilla.suse.com/936831"
},
{
"category": "external",
"summary": "SUSE Bug 939276 for CVE-2015-5366",
"url": "https://bugzilla.suse.com/939276"
},
{
"category": "external",
"summary": "SUSE Bug 945112 for CVE-2015-5366",
"url": "https://bugzilla.suse.com/945112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-12-02T10:32:42Z",
"details": "moderate"
}
],
"title": "CVE-2015-5366"
},
{
"cve": "CVE-2015-5697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5697"
}
],
"notes": [
{
"category": "general",
"text": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5697",
"url": "https://www.suse.com/security/cve/CVE-2015-5697"
},
{
"category": "external",
"summary": "SUSE Bug 939994 for CVE-2015-5697",
"url": "https://bugzilla.suse.com/939994"
},
{
"category": "external",
"summary": "SUSE Bug 963994 for CVE-2015-5697",
"url": "https://bugzilla.suse.com/963994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 1.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-12-02T10:32:42Z",
"details": "low"
}
],
"title": "CVE-2015-5697"
},
{
"cve": "CVE-2015-5707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5707"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5707",
"url": "https://www.suse.com/security/cve/CVE-2015-5707"
},
{
"category": "external",
"summary": "SUSE Bug 923755 for CVE-2015-5707",
"url": "https://bugzilla.suse.com/923755"
},
{
"category": "external",
"summary": "SUSE Bug 940338 for CVE-2015-5707",
"url": "https://bugzilla.suse.com/940338"
},
{
"category": "external",
"summary": "SUSE Bug 940342 for CVE-2015-5707",
"url": "https://bugzilla.suse.com/940342"
},
{
"category": "external",
"summary": "SUSE Bug 963994 for CVE-2015-5707",
"url": "https://bugzilla.suse.com/963994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-12-02T10:32:42Z",
"details": "moderate"
}
],
"title": "CVE-2015-5707"
},
{
"cve": "CVE-2015-6252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-6252"
}
],
"notes": [
{
"category": "general",
"text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-6252",
"url": "https://www.suse.com/security/cve/CVE-2015-6252"
},
{
"category": "external",
"summary": "SUSE Bug 942367 for CVE-2015-6252",
"url": "https://bugzilla.suse.com/942367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-45.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-12-02T10:32:42Z",
"details": "low"
}
],
"title": "CVE-2015-6252"
}
]
}
CERTFR-2015-AVI-359
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Fedora. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Noyau Linux de Fedora versions inférieures à 4.1.5-100.fc21
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eNoyau Linux de Fedora versions inf\u00e9rieures \u00e0 4.1.5-100.fc21\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-9090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9090"
},
{
"name": "CVE-2014-9585",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9585"
},
{
"name": "CVE-2015-3290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3290"
},
{
"name": "CVE-2014-8159",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8159"
},
{
"name": "CVE-2015-3339",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3339"
},
{
"name": "CVE-2015-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0239"
},
{
"name": "CVE-2015-3291",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3291"
},
{
"name": "CVE-2015-2666",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2666"
},
{
"name": "CVE-2015-5697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5697"
},
{
"name": "CVE-2014-8133",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8133"
},
{
"name": "CVE-2015-1593",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1593"
},
{
"name": "CVE-2014-8134",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8134"
},
{
"name": "CVE-2015-1333",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1333"
},
{
"name": "CVE-2015-2150",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2150"
},
{
"name": "CVE-2015-1421",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1421"
},
{
"name": "CVE-2014-9529",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9529"
},
{
"name": "CVE-2015-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1420"
},
{
"name": "CVE-2015-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2042"
},
{
"name": "CVE-2015-0275",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0275"
},
{
"name": "CVE-2014-8989",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8989"
},
{
"name": "CVE-2014-8559",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8559"
},
{
"name": "CVE-2015-3636",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3636"
},
{
"name": "CVE-2014-9428",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9428"
}
],
"initial_release_date": "2015-08-20T00:00:00",
"last_revision_date": "2015-08-20T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-359",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-08-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le \u003cspan\nclass=\"textit\"\u003enoyau Linux de Fedora\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Fedora",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Fedora-2015-13391 du 19 ao\u00fbt 2015",
"url": "https://lwn.net/Articles/654984/"
}
]
}
CERTFR-2015-AVI-435
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5156"
},
{
"name": "CVE-2015-5697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5697"
},
{
"name": "CVE-2015-6252",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6252"
},
{
"name": "CVE-2015-0272",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0272"
},
{
"name": "CVE-2015-7312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7312"
},
{
"name": "CVE-2015-6937",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6937"
}
],
"initial_release_date": "2015-10-20T00:00:00",
"last_revision_date": "2015-10-20T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-435",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-10-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le \u003cspan\nclass=\"textit\"\u003enoyau Linux Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2774-1 du 19 octobre 2015",
"url": "http://www.ubuntu.com/usn/usn-2774-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2776-1 du 19 octobre 2015",
"url": "http://www.ubuntu.com/usn/usn-2776-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2775-1 du 19 octobre 2015",
"url": "http://www.ubuntu.com/usn/usn-2775-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2777-1 du 19 octobre 2015",
"url": "http://www.ubuntu.com/usn/usn-2777-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2773-1 du 19 octobre 2015",
"url": "http://www.ubuntu.com/usn/usn-2773-1/"
}
]
}
CERTFR-2015-AVI-369
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-5707",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5707"
},
{
"name": "CVE-2015-5697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5697"
}
],
"initial_release_date": "2015-09-04T00:00:00",
"last_revision_date": "2015-09-04T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-369",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans noyau Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2732-1 du 03 septembre 2015",
"url": "http://www.ubuntu.com/usn/usn-2732-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2734-1 du 03 septembre 2015",
"url": "http://www.ubuntu.com/usn/usn-2734-1/"
}
]
}
CERTFR-2015-AVI-411
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux Ubuntu. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Noyau Ubuntu 14.04 LTS versions antérieures à 3.13.0-65.105
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eNoyau Ubuntu 14.04 LTS versions ant\u00e9rieures \u00e0 3.13.0-65.105\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-5697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5697"
},
{
"name": "CVE-2015-6252",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6252"
}
],
"initial_release_date": "2015-09-29T00:00:00",
"last_revision_date": "2015-09-29T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-411",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-09-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2748-1 du 28 septembre 2015",
"url": "http://www.ubuntu.com/usn/usn-2748-1/"
}
]
}
CERTFR-2015-AVI-331
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux Debian. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian Sid (unstable) versions ant\u00e9rieures \u00e0 4.1.3-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian Wheezy (oldstable) versions ant\u00e9rieures \u00e0 3.2.68-1+deb7u3",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian Jessie (stable) versions ant\u00e9rieures \u00e0 3.16.7-ckt11-1+deb8u3",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-5706",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5706"
},
{
"name": "CVE-2015-4692",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4692"
},
{
"name": "CVE-2015-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4700"
},
{
"name": "CVE-2015-5707",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5707"
},
{
"name": "CVE-2015-5697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5697"
},
{
"name": "CVE-2015-1333",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1333"
},
{
"name": "CVE-2015-5366",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5366"
},
{
"name": "CVE-2015-5364",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5364"
},
{
"name": "CVE-2015-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3212"
}
],
"initial_release_date": "2015-08-07T00:00:00",
"last_revision_date": "2015-08-07T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-331",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-08-07T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le \u003cspan\nclass=\"textit\"\u003enoyau Linux Debian\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-3329-1 du 07 ao\u00fbt 2015",
"url": "https://www.debian.org/security/2015/dsa-3329"
}
]
}
fkie_cve-2015-5697
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16 | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html | ||
| cve@mitre.org | http://www.debian.org/security/2015/dsa-3329 | ||
| cve@mitre.org | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6 | ||
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/07/28/2 | ||
| cve@mitre.org | http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | ||
| cve@mitre.org | http://www.securityfocus.com/bid/76066 | ||
| cve@mitre.org | http://www.securitytracker.com/id/1033211 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2731-1 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2732-1 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2748-1 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2749-1 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2751-1 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2752-1 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-2777-1 | ||
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1249011 | ||
| cve@mitre.org | https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3329 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/07/28/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/76066 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033211 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2731-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2732-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2748-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2749-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2751-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2752-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2777-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1249011 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16 |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44877FD6-2CE0-4950-B1C4-8B0A4E0E0333",
"versionEndIncluding": "4.1.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call."
},
{
"lang": "es",
"value": "Vulnerabilidad en la funci\u00f3n get_bitmap en drivers/md/md.c en el kernel de Linux en versiones anteriores a 4.1.6, no inicializa una cierta estructura de datos de mapa de bits, lo que permite a usuarios locales obtener informaci\u00f3n sensible de la memoria del kernel a trav\u00e9s de una llamada a GET_BITMAP_FILE de ioctl ."
}
],
"id": "CVE-2015-5697",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-08-31T10:59:14.847",
"references": [
{
"source": "cve@mitre.org",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2015/dsa-3329"
},
{
"source": "cve@mitre.org",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2015/07/28/2"
},
{
"source": "cve@mitre.org",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/76066"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1033211"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2731-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2732-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2748-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2749-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2751-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2752-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2777-1"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2015/dsa-3329"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2015/07/28/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/76066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1033211"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2731-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2732-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2748-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2749-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2751-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2752-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2777-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
cnvd-2015-05162
Vulnerability from cnvd
用户可参考如下厂商提供的安全补丁以修复该漏洞: http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4
| Name | Linux Kernel |
|---|
{
"bids": {
"bid": {
"bidNumber": "76066"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2015-5697"
}
},
"description": "Linux kernel\u662f\u4e00\u6b3e\u5f00\u6e90\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5f53bitmap\u6587\u4ef6\u901a\u8fc7get_bitmap_file()\u8bf7\u6c42\u8bbe\u5907\uff0c\u4f46bitmap\u7981\u7528\u65f6\uff0c\u7cfb\u7edf\u672a\u80fd\u6b63\u786e\u521d\u59cb\u5316\u8bf7\u6c42\u7f13\u51b2\u533a\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u83b7\u53d6\u5185\u6838\u5185\u5b58\u4e2d4095\u5b57\u8282\u4fe1\u606f\u3002",
"discovererName": "Linux",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-05162",
"openTime": "2015-08-10",
"patchDescription": "Linux kernel\u662f\u4e00\u6b3e\u5f00\u6e90\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Linux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5f53bitmap\u6587\u4ef6\u901a\u8fc7get_bitmap_file()\u8bf7\u6c42\u8bbe\u5907\uff0c\u4f46bitmap\u7981\u7528\u65f6\uff0c\u7cfb\u7edf\u672a\u80fd\u6b63\u786e\u521d\u59cb\u5316\u8bf7\u6c42\u7f13\u51b2\u533a\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u83b7\u53d6\u5185\u6838\u5185\u5b58\u4e2d4095\u5b57\u8282\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux MD\u9a71\u52a8\u521d\u59cb\u5316\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Linux Kernel"
},
"referenceLink": "http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4",
"serverity": "\u4f4e",
"submitTime": "2015-08-08",
"title": "Linux MD\u9a71\u52a8\u521d\u59cb\u5316\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e"
}
ghsa-6335-hw2p-8cqf
Vulnerability from github
The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.
{
"affected": [],
"aliases": [
"CVE-2015-5697"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-08-31T10:59:00Z",
"severity": "LOW"
},
"details": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.",
"id": "GHSA-6335-hw2p-8cqf",
"modified": "2022-05-17T00:51:26Z",
"published": "2022-05-17T00:51:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5697"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011"
},
{
"type": "WEB",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2015/dsa-3329"
},
{
"type": "WEB",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2015/07/28/2"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/76066"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1033211"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2731-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2732-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2748-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2749-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2751-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2752-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2777-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
gsd-2015-5697
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2015-5697",
"description": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.",
"id": "GSD-2015-5697",
"references": [
"https://www.suse.com/security/cve/CVE-2015-5697.html",
"https://www.debian.org/security/2015/dsa-3329",
"https://ubuntu.com/security/CVE-2015-5697",
"https://advisories.mageia.org/CVE-2015-5697.html",
"https://linux.oracle.com/cve/CVE-2015-5697.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-5697"
],
"details": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.",
"id": "GSD-2015-5697",
"modified": "2023-12-13T01:20:06.803438Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-5697",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-2748-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2748-1"
},
{
"name": "USN-2751-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2751-1"
},
{
"name": "USN-2731-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2731-1"
},
{
"name": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "SUSE-SU-2015:1727",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html"
},
{
"name": "[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/07/28/2"
},
{
"name": "76066",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76066"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "USN-2752-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2752-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011"
},
{
"name": "DSA-3329",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3329"
},
{
"name": "USN-2732-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2732-1"
},
{
"name": "USN-2749-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2749-1"
},
{
"name": "FEDORA-2015-12908",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "FEDORA-2015-13396",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html"
},
{
"name": "FEDORA-2015-13391",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html"
},
{
"name": "1033211",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033211"
},
{
"name": "USN-2777-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2777-1"
},
{
"name": "FEDORA-2015-12917",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.1.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-5697"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6"
},
{
"name": "[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2015/07/28/2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249011"
},
{
"name": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16",
"refsource": "CONFIRM",
"tags": [],
"url": "https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16",
"refsource": "CONFIRM",
"tags": [],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "76066",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/76066"
},
{
"name": "USN-2777-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2777-1"
},
{
"name": "USN-2748-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2748-1"
},
{
"name": "USN-2752-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2752-1"
},
{
"name": "USN-2751-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2751-1"
},
{
"name": "DSA-3329",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2015/dsa-3329"
},
{
"name": "USN-2749-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2749-1"
},
{
"name": "SUSE-SU-2015:1727",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html"
},
{
"name": "USN-2732-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2732-1"
},
{
"name": "USN-2731-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2731-1"
},
{
"name": "FEDORA-2015-13391",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html"
},
{
"name": "FEDORA-2015-13396",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html"
},
{
"name": "FEDORA-2015-12917",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html"
},
{
"name": "FEDORA-2015-12908",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html"
},
{
"name": "1033211",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1033211"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-09-21T01:29Z",
"publishedDate": "2015-08-31T10:59Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.