SUSE-SU-2015:0736-1

Vulnerability from csaf_suse - Published: 2014-09-25 15:06 - Updated: 2014-09-25 15:06
Summary
Security update for Linux kernel
Severity
Moderate
Notes
Title of the patch: Security update for Linux kernel
Description of the patch: The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues. The following security bugs have been fixed: * CVE-2014-1739: The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804). * CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518). * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (bnc#883724). * CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet (bnc#885422). * CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket (bnc#887082). * CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction (bnc#889173). * CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry. (bnc#892490) * CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry. (bnc#892490) * CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. (bnc#871797) * CVE-2014-4027: The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. (bnc#882639) * CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. (bnc#880892) * CVE-2014-6410: Avoid infinite loop when processing indirect ICBs (bnc#896689) The following non-security bugs have been fixed: * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911). * ACPI: Fix bug when ACPI reset register is implemented in system memory (bnc#882900). * ACPI: Limit access to custom_method (bnc#884333). * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746). * Add option to automatically enforce module signatures when in Secure Boot mode (bnc#884333). * Add secure_modules() call (bnc#884333). * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). * Backported new patches of Lock down functions for UEFI secure boot Also updated series.conf and removed old patches. * Btrfs: Return EXDEV for cross file system snapshot. * Btrfs: abort the transaction when we does not find our extent ref. * Btrfs: avoid warning bomb of btrfs_invalidate_inodes. * Btrfs: cancel scrub on transaction abortion. * Btrfs: correctly set profile flags on seqlock retry. * Btrfs: does not check nodes for extent items. * Btrfs: fix a possible deadlock between scrub and transaction committing. * Btrfs: fix corruption after write/fsync failure + fsync + log recovery (bnc#894200). * Btrfs: fix csum tree corruption, duplicate and outdated checksums (bnc#891619). * Btrfs: fix double free in find_lock_delalloc_range. * Btrfs: fix possible memory leak in btrfs_create_tree(). * Btrfs: fix use of uninit 'ret' in end_extent_writepage(). * Btrfs: free delayed node outside of root->inode_lock (bnc#866864). * Btrfs: make DEV_INFO ioctl available to anyone. * Btrfs: make FS_INFO ioctl available to anyone. * Btrfs: make device scan less noisy. * Btrfs: make sure there are not any read requests before stopping workers. * Btrfs: more efficient io tree navigation on wait_extent_bit. * Btrfs: output warning instead of error when loading free space cache failed. * Btrfs: retrieve more info from FS_INFO ioctl. * Btrfs: return EPERM when deleting a default subvolume (bnc#869934). * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * Btrfs: use right type to get real comparison. * Btrfs: wake up @scrub_pause_wait as much as we can. * Btrfs: wake up transaction thread upon remount. * CacheFiles: Add missing retrieval completions (bnc#880344). * CacheFiles: Does not try to dump the index key if the cookie has been cleared (bnc#880344). * CacheFiles: Downgrade the requirements passed to the allocator (bnc#880344). * CacheFiles: Fix the marking of cached pages (bnc#880344). * CacheFiles: Implement invalidation (bnc#880344). * CacheFiles: Make some debugging statements conditional (bnc#880344). * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). * FS-Cache: Add transition to handle invalidate immediately after lookup (bnc#880344). * FS-Cache: Check that there are no read ops when cookie relinquished (bnc#880344). * FS-Cache: Clear remaining page count on retrieval cancellation (bnc#880344). * FS-Cache: Convert the object event ID #defines into an enum (bnc#880344). * FS-Cache: Does not sleep in page release if __GFP_FS is not set (bnc#880344). * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344). * FS-Cache: Exclusive op submission can BUG if there is been an I/O error (bnc#880344). * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the counter != 0 (bnc#880344). * FS-Cache: Fix object state machine to have separate work and wait states (bnc#880344). * FS-Cache: Fix operation state management and accounting (bnc#880344). * FS-Cache: Fix signal handling during waits (bnc#880344). * FS-Cache: Initialise the object event mask with the calculated mask (bnc#880344). * FS-Cache: Limit the number of I/O error reports for a cache (bnc#880344). * FS-Cache: Make cookie relinquishment wait for outstanding reads (bnc#880344). * FS-Cache: Mark cancellation of in-progress operation (bnc#880344). * FS-Cache: One of the write operation paths doeses not set the object state (bnc#880344). * FS-Cache: Provide proper invalidation (bnc#880344). * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops (bnc#880344). * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t (bnc#880344). * FS-Cache: Uninline fscache_object_init() (bnc#880344). * FS-Cache: Wrap checks on object state (bnc#880344). * HID: usbhid: add always-poll quirk (bnc#888607). * HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#888607). * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). * Ignore 'flags' change to event_constraint (bnc#876114). * Ignore data_src/weight changes to perf_sample_data (bnc#876114). * NFS: Allow more operations in an NFSv4.1 request (bnc#890513). * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968). * NFS: Does not copy read delegation stateids in setattr (bnc#888968). * NFS: Does not use a delegation to open a file when returning that delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496) * NFS: Fixes for NFS RCU-walk support in line with code going upstream * NFS: Use FS-Cache invalidation (bnc#880344). * NFS: allow lockless access to access_cache (bnc#866130). * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts (bnc#888591). * NFS: nfs4_do_open should add negative results to the dcache (bnc#866130). * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a page (bnc#880344). * NFS: nfs_open_revalidate: only evaluate parent if it will be used (bnc#866130). * NFS: prepare for RCU-walk support but pushing tests later in code (bnc#866130). * NFS: support RCU_WALK in nfs_permission() (bnc#866130). * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). * NFSD: Does not hand out delegations for 30 seconds after recalling them (bnc#880370). * NFSv4 set open access operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, bnc#893596, bnc#893496). * NFSv4: Add a helper for encoding opaque data (bnc#888968). * NFSv4: Add a helper for encoding stateids (bnc#888968). * NFSv4: Add helpers for basic copying of stateids (bnc#888968). * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968). * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968). * NFSv4: Rename nfs4_copy_stateid() (bnc#888968). * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an error (bnc#888968). * NFSv4: Simplify the struct nfs4_stateid (bnc#888968). * NFSv4: The stateid must remain the same for replayed RPC calls (bnc#888968). * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid stateid (bnc#888968). * One more fix for kABI breakage. * PCI: Lock down BAR access when module security is enabled (bnc#884333). * PCI: enable MPS 'performance' setting to properly handle bridge MPS (bnc#883376). * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441). * PM / Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). * PM / Hibernate: Implement position keeping in radix tree (bnc#860441). * PM / Hibernate: Iterate over set bits instead of PFNs in swsusp_free() (bnc#860441). * PM / Hibernate: Remove the old memory-bitmap implementation (bnc#860441). * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node (bnc#860441). * Restrict /dev/mem and /dev/kmem when module loading is restricted (bnc#884333). * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). * USB: handle LPM errors during device suspend correctly (bnc#849123). * Update kabi files to reflect fscache change (bnc#880344) * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281) * VFS: Make more complete truncate operation available to CacheFiles (bnc#880344). * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). * acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted (bnc#884333). * af_iucv: correct cleanup if listen backlog is full (bnc#885262, LTC#111728). * asus-wmi: Restrict debugfs interface when module loading is restricted (bnc#884333). * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130). * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130). * autofs4: does not take spinlock when not needed in autofs4_lookup_expiring (bnc#866130). * autofs4: factor should_expire() out of autofs4_expire_indirect (bnc#866130). * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130). * autofs4: remove a redundant assignment (bnc#866130). * autofs: fix lockref lookup (bnc#888591). * be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). * block: add cond_resched() to potentially long running ioctl discard loop (bnc#884725). * block: fix race between request completion and timeout handling (bnc#881051). * cdc-ether: clean packet filter upon probe (bnc#876017). * cpuset: Fix memory allocator deadlock (bnc#876590). * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have them, but some are FIPS certified, with some kernel support. * crypto: fips - only panic on bad/missing crypto mod signatures (bnc#887503). * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode (bnc#889451). * dasd: validate request size before building CCW/TCW (bnc#891087, LTC#114068). * dm mpath: fix race condition between multipath_dtr and pg_init_done (bnc#826486). * dm-mpath: fix panic on deleting sg device (bnc#870161). * drm/ast: AST2000 cannot be detected correctly (bnc#895983). * drm/ast: Actually load DP501 firmware when required (bnc#895608 bnc#871134). * drm/ast: Add missing entry to dclk_table[]. * drm/ast: Add reduced non reduced mode parsing for wide screen mode (bnc#892723). * drm/ast: initial DP501 support (v0.2) (bnc#871134). * drm/ast: open key before detect chips (bnc#895983). * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). * drm/i915: create functions for the 'unclaimed register' checks (bnc#869055). * drm/i915: use FPGA_DBG for the 'unclaimed register' checks (bnc#869055). * drm/mgag200: Initialize data needed to map fbdev memory (bnc #806990). * e1000e: enable support for new device IDs (bnc#885509). * fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). * hibernate: Disable in a signed modules environment (bnc#884333). * hugetlb: does not use ERR_PTR with VM_FAULT* values * ibmvscsi: Abort init sequence during error recovery (bnc#885382). * ibmvscsi: Add memory barriers for send / receive (bnc#885382). * inet: add a redirect generation id in inetpeer (bnc#860593). * inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593). * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645). * kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593). * kernel: 3215 tty hang (bnc#891087, LTC#114562). * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). * kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). * kernel: sclp console tty reference counting (bnc#891087, LTC#115466). * kexec: Disable at runtime if the kernel enforces module loading restrictions (bnc#884333). * md/raid6: avoid data corruption during recovery of double-degraded RAID6. * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix). * memcg: do not expose uninitialized mem_cgroup_per_node to world (bnc#883096). * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() * mm, hugetlb: change variable name reservations to resv * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache * mm, hugetlb: defer freeing pages when gathering surplus pages * mm, hugetlb: do not use a page in page cache for cow optimization * mm, hugetlb: fix and clean-up node iteration code to alloc or free * mm, hugetlb: fix race in region tracking * mm, hugetlb: fix subpool accounting handling * mm, hugetlb: improve page-fault scalability * mm, hugetlb: improve, cleanup resv_map parameters * mm, hugetlb: move up the code which check availability of free huge page * mm, hugetlb: protect reserved pages when soft offlining a hugepage * mm, hugetlb: remove decrement_hugepage_resv_vma() * mm, hugetlb: remove redundant list_empty check in gather_surplus_pages() * mm, hugetlb: remove resv_map_put * mm, hugetlb: remove useless check about mapping type * mm, hugetlb: return a reserved page to a reserved pool if failed * mm, hugetlb: trivial commenting fix * mm, hugetlb: unify region structure handling * mm, hugetlb: unify region structure handling kabi * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb Fault Scalability). * mm, hugetlb: use vma_resv_map() map types * mm, oom: fix badness score underflow (bnc#884582, bnc#884767). * mm, oom: normalize oom scores to oom_score_adj scale only for userspace (bnc#884582, bnc#884767). * mm, thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). * net/mlx4_core: Load higher level modules according to ports type (bnc#887680). * net/mlx4_core: Load the IB driver when the device supports IBoE (bnc#887680). * net/mlx4_en: Fix a race between napi poll function and RX ring cleanup (bnc#863586). * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058). * net: fix checksumming features handling in output path (bnc#891259). * pagecache_limit: batch large nr_to_scan targets (bnc#895221). * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim fix (bnc#895680). * perf/core: Add weighted samples (bnc#876114). * perf/x86: Add flags to event constraints (bnc#876114). * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). * perf: Add generic memory sampling interface (bnc#876114). * qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (bnc#859840). * qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (bnc#859840). * qla2xxx: Does not check for firmware hung during the reset context for ISP82XX (bnc#859840). * qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (bnc#859840). * qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (bnc#859840). * qla2xxx: Set host can_queue value based on available resources (bnc#859840). * restore smp_mb() in unlock_new_inode() (bnc#890526). * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). * sched: fix the theoretical signal_wake_up() vs schedule() race (bnc#876055). * sclp_vt220: Enable integrated ASCII console per default (bnc#885262, LTC#112035). * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). * scsiback: correct grant page unmapping. * scsiback: fix retry handling in __report_luns(). * scsiback: free resources after error. * sunrpc/auth: allow lockless (rcu) lookup of credential cache (bnc#866130). * supported.conf: remove external from drivers/net/veth (bnc#889727) * supported.conf: support net/sched/act_police.ko (bnc#890426) * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921). * tg3: Change nvram command timeout value to 50ms (bnc#855657). * tg3: Override clock, link aware and link idle mode during NVRAM dump (bnc#855657). * tg3: Set the MAC clock to the fastest speed during boot code load (bnc#855657). * usb: Does not enable LPM if the exit latency is zero (bnc#832309). * usbcore: Does not log on consecutive debounce failures of the same port (bnc#888105). * usbhid: fix PIXART optical mouse (bnc#888607). * uswsusp: Disable when module loading is restricted (bnc#884333). * vscsi: support larger transfer sizes (bnc#774818). * writeback: Do not sync data dirtied after sync start (bnc#833820). * x86 thermal: Delete power-limit-notification console messages (bnc#882317). * x86 thermal: Disable power limit notification interrupt by default (bnc#882317). * x86 thermal: Re-enable power limit notification interrupt by default (bnc#882317). * x86, cpu hotplug: Fix stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). * x86/UV: Add kdump to UV NMI handler (bnc#888847). * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847). * x86/UV: Move NMI support (bnc#888847). * x86/UV: Update UV support for external NMI signals (bnc#888847). * x86/uv/nmi: Fix Sparse warnings (bnc#888847). * x86: Add check for number of available vectors before CPU down (bnc#887418). * x86: Lock down IO port access when module security is enabled (bnc#884333). * x86: Restrict MSR access when module loading is restricted (bnc#884333). Security Issues: * CVE-2013-1979 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979> * CVE-2014-1739 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739> * CVE-2014-2706 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706> * CVE-2014-4027 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027> * CVE-2014-4171 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171> * CVE-2014-4508 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508> * CVE-2014-4667 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667> * CVE-2014-4943 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943> * CVE-2014-5077 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077> * CVE-2014-5471 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471> * CVE-2014-5472 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472> * CVE-2014-3153 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153> * CVE-2014-6410 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410> The SUSE Linux Enterprise 11 Service Pack 3 RealTime Extension kernel was updated to fix various bugs and security issues. Following security bugs were fixed: CVE-2013-1979: The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application (bnc#816708). CVE-2014-1739: The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804). CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518). CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (bnc#883724). CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet (bnc#885422). CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket (bnc#887082). CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction (bnc#889173). CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry. (bnc#892490) CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry. (bnc#892490) CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. (bnc#871797) CVE-2014-4027: The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. (bnc#882639) CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. (bnc#880892) CVE-2014-6410: Avoid infinite loop when processing indirect ICBs (bnc#896689) The following non-security bugs were fixed: - ACPI / PAD: call schedule() when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset register is implemented in system memory (bnc#882900). - ACPI: Limit access to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746). - Add option to automatically enforce module signatures when in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). - Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported new patches of Lock down functions for UEFI secure boot Also updated series.conf and removed old patches. - Btrfs: Return EXDEV for cross file system snapshot. - Btrfs: abort the transaction when we does not find our extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not check nodes for extent items. - Btrfs: fix a possible deadlock between scrub and transaction committing. - Btrfs: fix corruption after write/fsync failure + fsync + log recovery (bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated checksums (bnc#891619). - Btrfs: fix double free in find_lock_delalloc_range. - Btrfs: fix possible memory leak in btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in end_extent_writepage(). - Btrfs: free delayed node outside of root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make device scan less noisy. - Btrfs: make sure there are not any read requests before stopping workers. - Btrfs: more efficient io tree navigation on wait_extent_bit. - Btrfs: output warning instead of error when loading free space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). - Btrfs: use right type to get real comparison. - Btrfs: wake up @scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). - CacheFiles: Does not try to dump the index key if the cookie has been cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - CacheFiles: Make some debugging statements conditional (bnc#880344). - Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - FS-Cache: Add transition to handle invalidate immediately after lookup (bnc#880344). - FS-Cache: Check that there are no read ops when cookie relinquished (bnc#880344). - FS-Cache: Clear remaining page count on retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state machine to have separate work and wait states (bnc#880344). - FS-Cache: Fix operation state management and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise the object event mask with the calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of in-progress operation (bnc#880344). - FS-Cache: One of the write operation paths doeses not set the object state (bnc#880344). - FS-Cache: Provide proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on object state (bnc#880344). - HID: usbhid: add always-poll quirk (bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - Ignore 'flags' change to event_constraint (bnc#876114). - Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read delegation stateids in setattr (bnc#888968). - NFS: Does not use a delegation to open a file when returning that delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support in line with code going upstream - NFS: Use FS-Cache invalidation (bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts (bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data (bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current should return 'true' for an invalid stateid (bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR access when module security is enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM errors during device suspend correctly (bnc#849123). - Update kabi files to reflect fscache change (bnc#880344) - Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted (bnc#884333). - af_iucv: correct cleanup if listen backlog is full (bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out of autofs4_expire_indirect (bnc#866130). - autofs4: make 'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - block: add cond_resched() to potentially long running ioctl discard loop (bnc#884725). - block: fix race between request completion and timeout handling (bnc#881051). - cdc-ether: clean packet filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have them, but some are FIPS certified, with some kernel support. - crypto: fips - only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode (bnc#889451). - dasd: validate request size before building CCW/TCW (bnc#891087, LTC#114068). - dm mpath: fix race condition between multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) (bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - drm/i915: create functions for the 'unclaimed register' checks (bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks (bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory (bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). - hibernate: Disable in a signed modules environment (bnc#884333). - hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init sequence during error recovery (bnc#885382). - ibmvscsi: Add memory barriers for send / receive (bnc#885382). - inet: add a redirect generation id in inetpeer (bnc#860593). - inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime if the kernel enforces module loading restrictions (bnc#884333). - md/raid6: avoid data corruption during recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change variable name reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus pages - mm, hugetlb: do not use a page in page cache for cow optimization - mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: improve, cleanup resv_map parameters - mm, hugetlb: move up the code which check availability of free huge page - mm, hugetlb: protect reserved pages when soft offlining a hugepage - mm, hugetlb: remove decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, hugetlb: remove useless check about mapping type - mm, hugetlb: return a reserved page to a reserved pool if failed - mm, hugetlb: trivial commenting fix - mm, hugetlb: unify region structure handling - mm, hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars instead of int in region_count() (Hugetlb Fault Scalability). - mm, hugetlb: use vma_resv_map() map types - mm, oom: fix badness score underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). - net/mlx4_core: Load higher level modules according to ports type (bnc#887680). - net/mlx4_core: Load the IB driver when the device supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058). - net: fix checksumming features handling in output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets (bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples (bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (bnc#859840). - qla2xxx: Set host can_queue value based on available resources (bnc#859840). - restore smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: Enable integrated ASCII console per default (bnc#885262, LTC#112035). - scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix retry handling in __report_luns(). - scsiback: free resources after error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache (bnc#866130). - supported.conf: remove external from drivers/net/veth (bnc#889727) - supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram command timeout value to 50ms (bnc#855657). - tg3: Override clock, link aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed during boot code load (bnc#855657). - usb: Does not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive debounce failures of the same port (bnc#888105). - usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when module loading is restricted (bnc#884333). - vscsi: support larger transfer sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start (bnc#833820). - x86 thermal: Delete power-limit-notification console messages (bnc#882317). - x86 thermal: Disable power limit notification interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV: Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number of available vectors before CPU down (bnc#887418). - x86: Lock down IO port access when module security is enabled (bnc#884333). - x86: Restrict MSR access when module loading is restricted (bnc#884333). Security Issues: * CVE-2013-1979 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979> * CVE-2014-1739 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739> * CVE-2014-2706 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706> * CVE-2014-4027 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027> * CVE-2014-4171 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171> * CVE-2014-4508 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508> * CVE-2014-4667 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667> * CVE-2014-4943 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943> * CVE-2014-5077 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077> * CVE-2014-5471 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471> * CVE-2014-5472 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472> * CVE-2014-3153 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153> * CVE-2014-6410 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410>
Patchnames: slertesp3-kernel
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/599263 self
https://bugzilla.suse.com/708296 self
https://bugzilla.suse.com/733022 self
https://bugzilla.suse.com/745640 self
https://bugzilla.suse.com/754690 self
https://bugzilla.suse.com/755743 self
https://bugzilla.suse.com/760407 self
https://bugzilla.suse.com/763463 self
https://bugzilla.suse.com/763968 self
https://bugzilla.suse.com/765523 self
https://bugzilla.suse.com/767610 self
https://bugzilla.suse.com/769035 self
https://bugzilla.suse.com/769644 self
https://bugzilla.suse.com/770541 self
https://bugzilla.suse.com/771619 self
https://bugzilla.suse.com/773006 self
https://bugzilla.suse.com/773255 self
https://bugzilla.suse.com/773837 self
https://bugzilla.suse.com/774818 self
https://bugzilla.suse.com/779488 self
https://bugzilla.suse.com/783475 self
https://bugzilla.suse.com/785901 self
https://bugzilla.suse.com/786450 self
https://bugzilla.suse.com/787843 self
https://bugzilla.suse.com/789010 self
https://bugzilla.suse.com/789359 self
https://bugzilla.suse.com/792271 self
https://bugzilla.suse.com/792991 self
https://bugzilla.suse.com/793727 self
https://bugzilla.suse.com/794824 self
https://bugzilla.suse.com/797090 self
https://bugzilla.suse.com/797526 self
https://bugzilla.suse.com/797727 self
https://bugzilla.suse.com/797909 self
https://bugzilla.suse.com/798050 self
https://bugzilla.suse.com/800255 self
https://bugzilla.suse.com/800875 self
https://bugzilla.suse.com/800907 self
https://bugzilla.suse.com/801341 self
https://bugzilla.suse.com/801427 self
https://bugzilla.suse.com/803174 self
https://bugzilla.suse.com/803320 self
https://bugzilla.suse.com/804482 self
https://bugzilla.suse.com/804609 self
https://bugzilla.suse.com/804950 self
https://bugzilla.suse.com/805114 self
https://bugzilla.suse.com/805371 self
https://bugzilla.suse.com/805740 self
https://bugzilla.suse.com/805804 self
https://bugzilla.suse.com/805945 self
https://bugzilla.suse.com/806396 self
https://bugzilla.suse.com/806976 self
https://bugzilla.suse.com/806988 self
https://bugzilla.suse.com/806990 self
https://bugzilla.suse.com/807471 self
https://bugzilla.suse.com/807502 self
https://bugzilla.suse.com/808015 self
https://bugzilla.suse.com/808079 self
https://bugzilla.suse.com/808136 self
https://bugzilla.suse.com/808647 self
https://bugzilla.suse.com/808837 self
https://bugzilla.suse.com/808855 self
https://bugzilla.suse.com/808940 self
https://bugzilla.suse.com/809122 self
https://bugzilla.suse.com/809130 self
https://bugzilla.suse.com/809220 self
https://bugzilla.suse.com/809463 self
https://bugzilla.suse.com/809617 self
https://bugzilla.suse.com/809895 self
https://bugzilla.suse.com/809975 self
https://bugzilla.suse.com/810098 self
https://bugzilla.suse.com/810210 self
https://bugzilla.suse.com/810323 self
https://bugzilla.suse.com/810722 self
https://bugzilla.suse.com/812274 self
https://bugzilla.suse.com/812281 self
https://bugzilla.suse.com/812332 self
https://bugzilla.suse.com/812526 self
https://bugzilla.suse.com/812974 self
https://bugzilla.suse.com/813245 self
https://bugzilla.suse.com/813604 self
https://bugzilla.suse.com/813733 self
https://bugzilla.suse.com/813922 self
https://bugzilla.suse.com/814336 self
https://bugzilla.suse.com/815256 self
https://bugzilla.suse.com/815320 self
https://bugzilla.suse.com/815356 self
https://bugzilla.suse.com/816043 self
https://bugzilla.suse.com/816065 self
https://bugzilla.suse.com/816099 self
https://bugzilla.suse.com/816403 self
https://bugzilla.suse.com/816451 self
https://bugzilla.suse.com/816708 self
https://bugzilla.suse.com/816892 self
https://bugzilla.suse.com/816925 self
https://bugzilla.suse.com/816971 self
https://bugzilla.suse.com/817035 self
https://bugzilla.suse.com/817339 self
https://bugzilla.suse.com/817377 self
https://bugzilla.suse.com/818047 self
https://bugzilla.suse.com/818053 self
https://bugzilla.suse.com/818064 self
https://bugzilla.suse.com/818154 self
https://bugzilla.suse.com/818371 self
https://bugzilla.suse.com/818465 self
https://bugzilla.suse.com/818497 self
https://bugzilla.suse.com/818545 self
https://bugzilla.suse.com/819018 self
https://bugzilla.suse.com/819195 self
https://bugzilla.suse.com/819295 self
https://bugzilla.suse.com/819363 self
https://bugzilla.suse.com/819519 self
https://bugzilla.suse.com/819523 self
https://bugzilla.suse.com/819610 self
https://bugzilla.suse.com/819655 self
https://bugzilla.suse.com/819789 self
https://bugzilla.suse.com/819979 self
https://bugzilla.suse.com/820102 self
https://bugzilla.suse.com/820172 self
https://bugzilla.suse.com/820183 self
https://bugzilla.suse.com/820338 self
https://bugzilla.suse.com/820434 self
https://bugzilla.suse.com/820569 self
https://bugzilla.suse.com/820738 self
https://bugzilla.suse.com/820848 self
https://bugzilla.suse.com/820948 self
https://bugzilla.suse.com/820982 self
https://bugzilla.suse.com/821052 self
https://bugzilla.suse.com/821070 self
https://bugzilla.suse.com/821235 self
https://bugzilla.suse.com/821259 self
https://bugzilla.suse.com/821465 self
https://bugzilla.suse.com/821560 self
https://bugzilla.suse.com/821619 self
https://bugzilla.suse.com/821799 self
https://bugzilla.suse.com/821802 self
https://bugzilla.suse.com/821859 self
https://bugzilla.suse.com/821930 self
https://bugzilla.suse.com/821948 self
https://bugzilla.suse.com/821980 self
https://bugzilla.suse.com/822052 self
https://bugzilla.suse.com/822066 self
https://bugzilla.suse.com/822077 self
https://bugzilla.suse.com/822080 self
https://bugzilla.suse.com/822164 self
https://bugzilla.suse.com/822225 self
https://bugzilla.suse.com/822340 self
https://bugzilla.suse.com/822431 self
https://bugzilla.suse.com/822433 self
https://bugzilla.suse.com/822575 self
https://bugzilla.suse.com/822579 self
https://bugzilla.suse.com/822722 self
https://bugzilla.suse.com/822825 self
https://bugzilla.suse.com/822878 self
https://bugzilla.suse.com/822942 self
https://bugzilla.suse.com/823082 self
https://bugzilla.suse.com/823191 self
https://bugzilla.suse.com/823223 self
https://bugzilla.suse.com/823342 self
https://bugzilla.suse.com/823386 self
https://bugzilla.suse.com/823517 self
https://bugzilla.suse.com/823597 self
https://bugzilla.suse.com/823618 self
https://bugzilla.suse.com/823795 self
https://bugzilla.suse.com/824159 self
https://bugzilla.suse.com/824256 self
https://bugzilla.suse.com/824295 self
https://bugzilla.suse.com/824568 self
https://bugzilla.suse.com/824915 self
https://bugzilla.suse.com/825006 self
https://bugzilla.suse.com/825037 self
https://bugzilla.suse.com/825048 self
https://bugzilla.suse.com/825142 self
https://bugzilla.suse.com/825227 self
https://bugzilla.suse.com/825291 self
https://bugzilla.suse.com/825591 self
https://bugzilla.suse.com/825657 self
https://bugzilla.suse.com/825696 self
https://bugzilla.suse.com/825887 self
https://bugzilla.suse.com/825896 self
https://bugzilla.suse.com/826102 self
https://bugzilla.suse.com/826186 self
https://bugzilla.suse.com/826350 self
https://bugzilla.suse.com/826486 self
https://bugzilla.suse.com/826602 self
https://bugzilla.suse.com/826756 self
https://bugzilla.suse.com/826960 self
https://bugzilla.suse.com/826978 self
https://bugzilla.suse.com/827246 self
https://bugzilla.suse.com/827271 self
https://bugzilla.suse.com/827372 self
https://bugzilla.suse.com/827376 self
https://bugzilla.suse.com/827378 self
https://bugzilla.suse.com/827416 self
https://bugzilla.suse.com/827527 self
https://bugzilla.suse.com/827670 self
https://bugzilla.suse.com/827749 self
https://bugzilla.suse.com/827750 self
https://bugzilla.suse.com/827767 self
https://bugzilla.suse.com/827930 self
https://bugzilla.suse.com/827966 self
https://bugzilla.suse.com/828087 self
https://bugzilla.suse.com/828119 self
https://bugzilla.suse.com/828192 self
https://bugzilla.suse.com/828236 self
https://bugzilla.suse.com/828265 self
https://bugzilla.suse.com/828574 self
https://bugzilla.suse.com/828714 self
https://bugzilla.suse.com/828886 self
https://bugzilla.suse.com/828894 self
https://bugzilla.suse.com/828914 self
https://bugzilla.suse.com/829001 self
https://bugzilla.suse.com/829082 self
https://bugzilla.suse.com/829110 self
https://bugzilla.suse.com/829357 self
https://bugzilla.suse.com/829539 self
https://bugzilla.suse.com/829622 self
https://bugzilla.suse.com/829682 self
https://bugzilla.suse.com/830346 self
https://bugzilla.suse.com/830478 self
https://bugzilla.suse.com/830766 self
https://bugzilla.suse.com/830822 self
https://bugzilla.suse.com/830901 self
https://bugzilla.suse.com/830985 self
https://bugzilla.suse.com/831029 self
https://bugzilla.suse.com/831055 self
https://bugzilla.suse.com/831058 self
https://bugzilla.suse.com/831103 self
https://bugzilla.suse.com/831143 self
https://bugzilla.suse.com/831380 self
https://bugzilla.suse.com/831410 self
https://bugzilla.suse.com/831422 self
https://bugzilla.suse.com/831424 self
https://bugzilla.suse.com/831438 self
https://bugzilla.suse.com/831623 self
https://bugzilla.suse.com/831949 self
https://bugzilla.suse.com/832292 self
https://bugzilla.suse.com/832309 self
https://bugzilla.suse.com/832318 self
https://bugzilla.suse.com/832710 self
https://bugzilla.suse.com/833073 self
https://bugzilla.suse.com/833097 self
https://bugzilla.suse.com/833148 self
https://bugzilla.suse.com/833151 self
https://bugzilla.suse.com/833321 self
https://bugzilla.suse.com/833588 self
https://bugzilla.suse.com/833635 self
https://bugzilla.suse.com/833820 self
https://bugzilla.suse.com/833858 self
https://bugzilla.suse.com/833968 self
https://bugzilla.suse.com/834116 self
https://bugzilla.suse.com/834204 self
https://bugzilla.suse.com/834473 self
https://bugzilla.suse.com/834600 self
https://bugzilla.suse.com/834647 self
https://bugzilla.suse.com/834708 self
https://bugzilla.suse.com/834742 self
https://bugzilla.suse.com/834808 self
https://bugzilla.suse.com/834905 self
https://bugzilla.suse.com/835074 self
https://bugzilla.suse.com/835094 self
https://bugzilla.suse.com/835175 self
https://bugzilla.suse.com/835186 self
https://bugzilla.suse.com/835189 self
https://bugzilla.suse.com/835684 self
https://bugzilla.suse.com/835839 self
https://bugzilla.suse.com/835930 self
https://bugzilla.suse.com/836218 self
https://bugzilla.suse.com/836347 self
https://bugzilla.suse.com/836718 self
https://bugzilla.suse.com/836801 self
https://bugzilla.suse.com/837206 self
https://bugzilla.suse.com/837372 self
https://bugzilla.suse.com/837563 self
https://bugzilla.suse.com/837596 self
https://bugzilla.suse.com/837739 self
https://bugzilla.suse.com/837741 self
https://bugzilla.suse.com/837803 self
https://bugzilla.suse.com/838346 self
https://bugzilla.suse.com/838448 self
https://bugzilla.suse.com/838623 self
https://bugzilla.suse.com/839407 self
https://bugzilla.suse.com/839973 self
https://bugzilla.suse.com/840116 self
https://bugzilla.suse.com/840226 self
https://bugzilla.suse.com/840524 self
https://bugzilla.suse.com/840830 self
https://bugzilla.suse.com/841050 self
https://bugzilla.suse.com/841094 self
https://bugzilla.suse.com/841402 self
https://bugzilla.suse.com/841445 self
https://bugzilla.suse.com/841498 self
https://bugzilla.suse.com/841654 self
https://bugzilla.suse.com/841656 self
https://bugzilla.suse.com/842057 self
https://bugzilla.suse.com/842063 self
https://bugzilla.suse.com/842239 self
https://bugzilla.suse.com/842604 self
https://bugzilla.suse.com/842820 self
https://bugzilla.suse.com/843185 self
https://bugzilla.suse.com/843419 self
https://bugzilla.suse.com/843429 self
https://bugzilla.suse.com/843445 self
https://bugzilla.suse.com/843642 self
https://bugzilla.suse.com/843645 self
https://bugzilla.suse.com/843654 self
https://bugzilla.suse.com/843732 self
https://bugzilla.suse.com/843753 self
https://bugzilla.suse.com/843950 self
https://bugzilla.suse.com/844513 self
https://bugzilla.suse.com/845352 self
https://bugzilla.suse.com/845378 self
https://bugzilla.suse.com/845621 self
https://bugzilla.suse.com/845729 self
https://bugzilla.suse.com/846036 self
https://bugzilla.suse.com/846298 self
https://bugzilla.suse.com/846404 self
https://bugzilla.suse.com/846654 self
https://bugzilla.suse.com/846656 self
https://bugzilla.suse.com/846690 self
https://bugzilla.suse.com/846790 self
https://bugzilla.suse.com/846984 self
https://bugzilla.suse.com/846989 self
https://bugzilla.suse.com/847261 self
https://bugzilla.suse.com/847319 self
https://bugzilla.suse.com/847652 self
https://bugzilla.suse.com/847660 self
https://bugzilla.suse.com/847672 self
https://bugzilla.suse.com/847842 self
https://bugzilla.suse.com/848055 self
https://bugzilla.suse.com/848317 self
https://bugzilla.suse.com/848321 self
https://bugzilla.suse.com/848335 self
https://bugzilla.suse.com/848336 self
https://bugzilla.suse.com/848544 self
https://bugzilla.suse.com/848864 self
https://bugzilla.suse.com/849021 self
https://bugzilla.suse.com/849029 self
https://bugzilla.suse.com/849034 self
https://bugzilla.suse.com/849123 self
https://bugzilla.suse.com/849256 self
https://bugzilla.suse.com/849362 self
https://bugzilla.suse.com/849364 self
https://bugzilla.suse.com/849404 self
https://bugzilla.suse.com/849675 self
https://bugzilla.suse.com/849809 self
https://bugzilla.suse.com/849855 self
https://bugzilla.suse.com/849950 self
https://bugzilla.suse.com/850072 self
https://bugzilla.suse.com/850103 self
https://bugzilla.suse.com/850324 self
https://bugzilla.suse.com/850493 self
https://bugzilla.suse.com/850640 self
https://bugzilla.suse.com/850915 self
https://bugzilla.suse.com/851066 self
https://bugzilla.suse.com/851101 self
https://bugzilla.suse.com/851290 self
https://bugzilla.suse.com/851314 self
https://bugzilla.suse.com/851426 self
https://bugzilla.suse.com/851603 self
https://bugzilla.suse.com/851879 self
https://bugzilla.suse.com/852153 self
https://bugzilla.suse.com/852373 self
https://bugzilla.suse.com/852488 self
https://bugzilla.suse.com/852553 self
https://bugzilla.suse.com/852558 self
https://bugzilla.suse.com/852559 self
https://bugzilla.suse.com/852652 self
https://bugzilla.suse.com/852761 self
https://bugzilla.suse.com/852967 self
https://bugzilla.suse.com/853040 self
https://bugzilla.suse.com/853050 self
https://bugzilla.suse.com/853051 self
https://bugzilla.suse.com/853052 self
https://bugzilla.suse.com/853053 self
https://bugzilla.suse.com/853162 self
https://bugzilla.suse.com/853166 self
https://bugzilla.suse.com/853428 self
https://bugzilla.suse.com/853455 self
https://bugzilla.suse.com/853465 self
https://bugzilla.suse.com/854025 self
https://bugzilla.suse.com/854445 self
https://bugzilla.suse.com/854516 self
https://bugzilla.suse.com/854546 self
https://bugzilla.suse.com/854634 self
https://bugzilla.suse.com/854722 self
https://bugzilla.suse.com/855126 self
https://bugzilla.suse.com/855657 self
https://bugzilla.suse.com/855825 self
https://bugzilla.suse.com/855885 self
https://bugzilla.suse.com/856307 self
https://bugzilla.suse.com/856481 self
https://bugzilla.suse.com/856760 self
https://bugzilla.suse.com/856848 self
https://bugzilla.suse.com/857358 self
https://bugzilla.suse.com/857643 self
https://bugzilla.suse.com/857919 self
https://bugzilla.suse.com/857926 self
https://bugzilla.suse.com/858534 self
https://bugzilla.suse.com/858604 self
https://bugzilla.suse.com/858831 self
https://bugzilla.suse.com/858869 self
https://bugzilla.suse.com/858870 self
https://bugzilla.suse.com/858872 self
https://bugzilla.suse.com/859225 self
https://bugzilla.suse.com/859342 self
https://bugzilla.suse.com/859840 self
https://bugzilla.suse.com/860441 self
https://bugzilla.suse.com/860593 self
https://bugzilla.suse.com/861093 self
https://bugzilla.suse.com/861636 self
https://bugzilla.suse.com/861980 self
https://bugzilla.suse.com/862429 self
https://bugzilla.suse.com/862796 self
https://bugzilla.suse.com/862934 self
https://bugzilla.suse.com/862957 self
https://bugzilla.suse.com/863178 self
https://bugzilla.suse.com/863300 self
https://bugzilla.suse.com/863335 self
https://bugzilla.suse.com/863410 self
https://bugzilla.suse.com/863526 self
https://bugzilla.suse.com/863586 self
https://bugzilla.suse.com/863873 self
https://bugzilla.suse.com/864025 self
https://bugzilla.suse.com/864058 self
https://bugzilla.suse.com/864401 self
https://bugzilla.suse.com/864404 self
https://bugzilla.suse.com/864409 self
https://bugzilla.suse.com/864411 self
https://bugzilla.suse.com/864464 self
https://bugzilla.suse.com/864833 self
https://bugzilla.suse.com/864880 self
https://bugzilla.suse.com/865310 self
https://bugzilla.suse.com/865330 self
https://bugzilla.suse.com/865342 self
https://bugzilla.suse.com/865419 self
https://bugzilla.suse.com/865783 self
https://bugzilla.suse.com/865882 self
https://bugzilla.suse.com/866081 self
https://bugzilla.suse.com/866102 self
https://bugzilla.suse.com/866130 self
https://bugzilla.suse.com/866253 self
https://bugzilla.suse.com/866428 self
https://bugzilla.suse.com/866615 self
https://bugzilla.suse.com/866800 self
https://bugzilla.suse.com/866864 self
https://bugzilla.suse.com/866911 self
https://bugzilla.suse.com/867362 self
https://bugzilla.suse.com/867517 self
https://bugzilla.suse.com/867531 self
https://bugzilla.suse.com/867723 self
https://bugzilla.suse.com/867953 self
https://bugzilla.suse.com/868049 self
https://bugzilla.suse.com/868488 self
https://bugzilla.suse.com/868528 self
https://bugzilla.suse.com/868653 self
https://bugzilla.suse.com/868748 self
https://bugzilla.suse.com/869033 self
https://bugzilla.suse.com/869055 self
https://bugzilla.suse.com/869414 self
https://bugzilla.suse.com/869563 self
https://bugzilla.suse.com/869934 self
https://bugzilla.suse.com/870161 self
https://bugzilla.suse.com/870173 self
https://bugzilla.suse.com/870335 self
https://bugzilla.suse.com/870450 self
https://bugzilla.suse.com/870496 self
https://bugzilla.suse.com/870498 self
https://bugzilla.suse.com/870576 self
https://bugzilla.suse.com/870591 self
https://bugzilla.suse.com/870618 self
https://bugzilla.suse.com/870801 self
https://bugzilla.suse.com/870877 self
https://bugzilla.suse.com/870958 self
https://bugzilla.suse.com/871134 self
https://bugzilla.suse.com/871561 self
https://bugzilla.suse.com/871634 self
https://bugzilla.suse.com/871676 self
https://bugzilla.suse.com/871728 self
https://bugzilla.suse.com/871797 self
https://bugzilla.suse.com/871854 self
https://bugzilla.suse.com/871861 self
https://bugzilla.suse.com/871899 self
https://bugzilla.suse.com/872188 self
https://bugzilla.suse.com/872540 self
https://bugzilla.suse.com/872634 self
https://bugzilla.suse.com/873061 self
https://bugzilla.suse.com/873228 self
https://bugzilla.suse.com/873374 self
https://bugzilla.suse.com/873463 self
https://bugzilla.suse.com/874108 self
https://bugzilla.suse.com/874145 self
https://bugzilla.suse.com/874440 self
https://bugzilla.suse.com/874577 self
https://bugzilla.suse.com/875051 self
https://bugzilla.suse.com/875386 self
https://bugzilla.suse.com/875690 self
https://bugzilla.suse.com/875798 self
https://bugzilla.suse.com/876017 self
https://bugzilla.suse.com/876055 self
https://bugzilla.suse.com/876086 self
https://bugzilla.suse.com/876102 self
https://bugzilla.suse.com/876114 self
https://bugzilla.suse.com/876176 self
https://bugzilla.suse.com/876463 self
https://bugzilla.suse.com/876590 self
https://bugzilla.suse.com/876594 self
https://bugzilla.suse.com/876633 self
https://bugzilla.suse.com/877013 self
https://bugzilla.suse.com/877257 self
https://bugzilla.suse.com/877456 self
https://bugzilla.suse.com/877497 self
https://bugzilla.suse.com/877593 self
https://bugzilla.suse.com/877775 self
https://bugzilla.suse.com/878115 self
https://bugzilla.suse.com/878123 self
https://bugzilla.suse.com/878274 self
https://bugzilla.suse.com/878407 self
https://bugzilla.suse.com/878509 self
https://bugzilla.suse.com/879304 self
https://bugzilla.suse.com/879921 self
https://bugzilla.suse.com/879957 self
https://bugzilla.suse.com/880007 self
https://bugzilla.suse.com/880344 self
https://bugzilla.suse.com/880357 self
https://bugzilla.suse.com/880370 self
https://bugzilla.suse.com/880437 self
https://bugzilla.suse.com/880484 self
https://bugzilla.suse.com/880892 self
https://bugzilla.suse.com/881051 self
https://bugzilla.suse.com/881571 self
https://bugzilla.suse.com/881759 self
https://bugzilla.suse.com/881761 self
https://bugzilla.suse.com/881939 self
https://bugzilla.suse.com/882317 self
https://bugzilla.suse.com/882324 self
https://bugzilla.suse.com/882470 self
https://bugzilla.suse.com/882639 self
https://bugzilla.suse.com/882804 self
https://bugzilla.suse.com/882900 self
https://bugzilla.suse.com/883096 self
https://bugzilla.suse.com/883376 self
https://bugzilla.suse.com/883380 self
https://bugzilla.suse.com/883518 self
https://bugzilla.suse.com/883724 self
https://bugzilla.suse.com/883795 self
https://bugzilla.suse.com/883948 self
https://bugzilla.suse.com/884333 self
https://bugzilla.suse.com/884582 self
https://bugzilla.suse.com/884725 self
https://bugzilla.suse.com/884767 self
https://bugzilla.suse.com/884817 self
https://bugzilla.suse.com/885077 self
https://bugzilla.suse.com/885262 self
https://bugzilla.suse.com/885382 self
https://bugzilla.suse.com/885422 self
https://bugzilla.suse.com/885509 self
https://bugzilla.suse.com/885725 self
https://bugzilla.suse.com/886840 self
https://bugzilla.suse.com/887082 self
https://bugzilla.suse.com/887418 self
https://bugzilla.suse.com/887503 self
https://bugzilla.suse.com/887597 self
https://bugzilla.suse.com/887608 self
https://bugzilla.suse.com/887645 self
https://bugzilla.suse.com/887680 self
https://bugzilla.suse.com/888058 self
https://bugzilla.suse.com/888105 self
https://bugzilla.suse.com/888591 self
https://bugzilla.suse.com/888607 self
https://bugzilla.suse.com/888847 self
https://bugzilla.suse.com/888849 self
https://bugzilla.suse.com/888968 self
https://bugzilla.suse.com/889061 self
https://bugzilla.suse.com/889173 self
https://bugzilla.suse.com/889221 self
https://bugzilla.suse.com/889451 self
https://bugzilla.suse.com/889614 self
https://bugzilla.suse.com/889727 self
https://bugzilla.suse.com/890297 self
https://bugzilla.suse.com/890426 self
https://bugzilla.suse.com/890513 self
https://bugzilla.suse.com/890526 self
https://bugzilla.suse.com/891087 self
https://bugzilla.suse.com/891211 self
https://bugzilla.suse.com/891212 self
https://bugzilla.suse.com/891259 self
https://bugzilla.suse.com/891277 self
https://bugzilla.suse.com/891281 self
https://bugzilla.suse.com/891368 self
https://bugzilla.suse.com/891619 self
https://bugzilla.suse.com/891641 self
https://bugzilla.suse.com/891746 self
https://bugzilla.suse.com/891790 self
https://bugzilla.suse.com/892200 self
https://bugzilla.suse.com/892490 self
https://bugzilla.suse.com/892723 self
https://bugzilla.suse.com/892782 self
https://bugzilla.suse.com/893064 self
https://bugzilla.suse.com/893496 self
https://bugzilla.suse.com/893596 self
https://bugzilla.suse.com/893758 self
https://bugzilla.suse.com/894058 self
https://bugzilla.suse.com/894200 self
https://bugzilla.suse.com/894213 self
https://bugzilla.suse.com/894895 self
https://bugzilla.suse.com/895221 self
https://bugzilla.suse.com/895387 self
https://bugzilla.suse.com/895468 self
https://bugzilla.suse.com/895608 self
https://bugzilla.suse.com/895680 self
https://bugzilla.suse.com/895841 self
https://bugzilla.suse.com/895983 self
https://bugzilla.suse.com/896382 self
https://bugzilla.suse.com/896390 self
https://bugzilla.suse.com/896391 self
https://bugzilla.suse.com/896392 self
https://bugzilla.suse.com/896415 self
https://bugzilla.suse.com/896484 self
https://bugzilla.suse.com/896689 self
https://bugzilla.suse.com/897502 self
https://bugzilla.suse.com/897694 self
https://bugzilla.suse.com/897708 self
https://bugzilla.suse.com/898295 self
https://bugzilla.suse.com/898375 self
https://bugzilla.suse.com/898554 self
https://bugzilla.suse.com/899192 self
https://bugzilla.suse.com/899574 self
https://bugzilla.suse.com/899843 self
https://bugzilla.suse.com/900279 self
https://bugzilla.suse.com/900644 self
https://bugzilla.suse.com/900881 self
https://bugzilla.suse.com/901638 self
https://bugzilla.suse.com/902232 self
https://bugzilla.suse.com/902286 self
https://bugzilla.suse.com/902346 self
https://bugzilla.suse.com/902349 self
https://bugzilla.suse.com/902351 self
https://bugzilla.suse.com/902675 self
https://bugzilla.suse.com/903096 self
https://bugzilla.suse.com/903331 self
https://bugzilla.suse.com/903640 self
https://bugzilla.suse.com/903653 self
https://bugzilla.suse.com/904013 self
https://bugzilla.suse.com/904053 self
https://bugzilla.suse.com/904242 self
https://bugzilla.suse.com/904358 self
https://bugzilla.suse.com/904659 self
https://bugzilla.suse.com/904671 self
https://bugzilla.suse.com/904700 self
https://bugzilla.suse.com/904883 self
https://bugzilla.suse.com/904901 self
https://bugzilla.suse.com/905100 self
https://bugzilla.suse.com/905304 self
https://bugzilla.suse.com/905312 self
https://bugzilla.suse.com/905522 self
https://bugzilla.suse.com/905799 self
https://bugzilla.suse.com/906027 self
https://bugzilla.suse.com/906586 self
https://bugzilla.suse.com/907196 self
https://bugzilla.suse.com/907338 self
https://bugzilla.suse.com/907551 self
https://bugzilla.suse.com/907611 self
https://bugzilla.suse.com/907818 self
https://bugzilla.suse.com/908069 self
https://bugzilla.suse.com/908163 self
https://bugzilla.suse.com/908393 self
https://bugzilla.suse.com/908550 self
https://bugzilla.suse.com/908551 self
https://bugzilla.suse.com/908572 self
https://bugzilla.suse.com/908706 self
https://bugzilla.suse.com/908825 self
https://bugzilla.suse.com/909077 self
https://bugzilla.suse.com/909078 self
https://bugzilla.suse.com/909088 self
https://bugzilla.suse.com/909092 self
https://bugzilla.suse.com/909093 self
https://bugzilla.suse.com/909095 self
https://bugzilla.suse.com/909264 self
https://bugzilla.suse.com/909309 self
https://bugzilla.suse.com/909312 self
https://bugzilla.suse.com/909477 self
https://bugzilla.suse.com/909565 self
https://bugzilla.suse.com/909684 self
https://bugzilla.suse.com/909740 self
https://bugzilla.suse.com/909846 self
https://bugzilla.suse.com/910013 self
https://bugzilla.suse.com/910150 self
https://bugzilla.suse.com/910159 self
https://bugzilla.suse.com/910251 self
https://bugzilla.suse.com/910321 self
https://bugzilla.suse.com/910322 self
https://bugzilla.suse.com/910517 self
https://bugzilla.suse.com/911181 self
https://bugzilla.suse.com/911325 self
https://bugzilla.suse.com/911326 self
https://bugzilla.suse.com/912171 self
https://bugzilla.suse.com/912202 self
https://bugzilla.suse.com/912705 self
https://bugzilla.suse.com/912741 self
https://bugzilla.suse.com/913059 self
https://bugzilla.suse.com/913080 self
https://bugzilla.suse.com/913598 self
https://bugzilla.suse.com/914355 self
https://bugzilla.suse.com/914423 self
https://bugzilla.suse.com/914726 self
https://bugzilla.suse.com/914742 self
https://bugzilla.suse.com/914818 self
https://bugzilla.suse.com/914987 self
https://bugzilla.suse.com/915045 self
https://bugzilla.suse.com/915200 self
https://bugzilla.suse.com/915209 self
https://bugzilla.suse.com/915322 self
https://bugzilla.suse.com/915335 self
https://bugzilla.suse.com/915577 self
https://bugzilla.suse.com/915791 self
https://bugzilla.suse.com/915826 self
https://bugzilla.suse.com/916515 self
https://bugzilla.suse.com/916521 self
https://bugzilla.suse.com/916848 self
https://bugzilla.suse.com/916982 self
https://bugzilla.suse.com/917093 self
https://bugzilla.suse.com/917120 self
https://bugzilla.suse.com/917648 self
https://bugzilla.suse.com/917684 self
https://bugzilla.suse.com/917830 self
https://bugzilla.suse.com/917839 self
https://bugzilla.suse.com/917884 self
https://bugzilla.suse.com/918333 self
https://bugzilla.suse.com/919007 self
https://bugzilla.suse.com/919018 self
https://bugzilla.suse.com/919357 self
https://bugzilla.suse.com/919463 self
https://bugzilla.suse.com/919589 self
https://bugzilla.suse.com/919682 self
https://bugzilla.suse.com/919808 self
https://bugzilla.suse.com/920250 self
https://bugzilla.suse.com/921769 self
https://bugzilla.suse.com/922583 self
https://bugzilla.suse.com/923344 self
https://bugzilla.suse.com/924142 self
https://bugzilla.suse.com/924271 self
https://bugzilla.suse.com/924282 self
https://bugzilla.suse.com/924333 self
https://bugzilla.suse.com/924340 self
https://bugzilla.suse.com/925012 self
https://bugzilla.suse.com/925370 self
https://bugzilla.suse.com/925443 self
https://bugzilla.suse.com/925567 self
https://bugzilla.suse.com/925729 self
https://bugzilla.suse.com/926016 self
https://bugzilla.suse.com/926240 self
https://bugzilla.suse.com/926439 self
https://bugzilla.suse.com/926767 self
https://bugzilla.suse.com/927190 self
https://bugzilla.suse.com/927257 self
https://bugzilla.suse.com/927262 self
https://bugzilla.suse.com/927338 self
https://bugzilla.suse.com/928122 self
https://bugzilla.suse.com/928130 self
https://bugzilla.suse.com/928142 self
https://bugzilla.suse.com/928333 self
https://bugzilla.suse.com/928970 self
https://bugzilla.suse.com/929145 self
https://bugzilla.suse.com/929148 self
https://bugzilla.suse.com/929283 self
https://bugzilla.suse.com/929525 self
https://bugzilla.suse.com/929647 self
https://bugzilla.suse.com/930145 self
https://bugzilla.suse.com/930171 self
https://bugzilla.suse.com/930226 self
https://bugzilla.suse.com/930284 self
https://bugzilla.suse.com/930401 self
https://bugzilla.suse.com/930669 self
https://bugzilla.suse.com/930786 self
https://bugzilla.suse.com/930788 self
https://bugzilla.suse.com/931014 self
https://bugzilla.suse.com/931015 self
https://bugzilla.suse.com/931850 self
https://www.suse.com/security/cve/CVE-2012-2372/ self
https://www.suse.com/security/cve/CVE-2012-4398/ self
https://www.suse.com/security/cve/CVE-2013-1059/ self
https://www.suse.com/security/cve/CVE-2013-1774/ self
https://www.suse.com/security/cve/CVE-2013-1819/ self
https://www.suse.com/security/cve/CVE-2013-1929/ self
https://www.suse.com/security/cve/CVE-2013-1979/ self
https://www.suse.com/security/cve/CVE-2013-2094/ self
https://www.suse.com/security/cve/CVE-2013-2146/ self
https://www.suse.com/security/cve/CVE-2013-2148/ self
https://www.suse.com/security/cve/CVE-2013-2164/ self
https://www.suse.com/security/cve/CVE-2013-2206/ self
https://www.suse.com/security/cve/CVE-2013-2232/ self
https://www.suse.com/security/cve/CVE-2013-2234/ self
https://www.suse.com/security/cve/CVE-2013-2237/ self
https://www.suse.com/security/cve/CVE-2013-2850/ self
https://www.suse.com/security/cve/CVE-2013-2851/ self
https://www.suse.com/security/cve/CVE-2013-2852/ self
https://www.suse.com/security/cve/CVE-2013-2889/ self
https://www.suse.com/security/cve/CVE-2013-2893/ self
https://www.suse.com/security/cve/CVE-2013-2897/ self
https://www.suse.com/security/cve/CVE-2013-2899/ self
https://www.suse.com/security/cve/CVE-2013-2929/ self
https://www.suse.com/security/cve/CVE-2013-2930/ self
https://www.suse.com/security/cve/CVE-2013-3301/ self
https://www.suse.com/security/cve/CVE-2013-4162/ self
https://www.suse.com/security/cve/CVE-2013-4163/ self
https://www.suse.com/security/cve/CVE-2013-4299/ self
https://www.suse.com/security/cve/CVE-2013-4345/ self
https://www.suse.com/security/cve/CVE-2013-4470/ self
https://www.suse.com/security/cve/CVE-2013-4483/ self
https://www.suse.com/security/cve/CVE-2013-4511/ self
https://www.suse.com/security/cve/CVE-2013-4514/ self
https://www.suse.com/security/cve/CVE-2013-4515/ self
https://www.suse.com/security/cve/CVE-2013-4579/ self
https://www.suse.com/security/cve/CVE-2013-4587/ self
https://www.suse.com/security/cve/CVE-2013-4592/ self
https://www.suse.com/security/cve/CVE-2013-6367/ self
https://www.suse.com/security/cve/CVE-2013-6368/ self
https://www.suse.com/security/cve/CVE-2013-6376/ self
https://www.suse.com/security/cve/CVE-2013-6378/ self
https://www.suse.com/security/cve/CVE-2013-6380/ self
https://www.suse.com/security/cve/CVE-2013-6382/ self
https://www.suse.com/security/cve/CVE-2013-6383/ self
https://www.suse.com/security/cve/CVE-2013-6463/ self
https://www.suse.com/security/cve/CVE-2013-6885/ self
https://www.suse.com/security/cve/CVE-2013-7027/ self
https://www.suse.com/security/cve/CVE-2013-7263/ self
https://www.suse.com/security/cve/CVE-2013-7264/ self
https://www.suse.com/security/cve/CVE-2013-7265/ self
https://www.suse.com/security/cve/CVE-2013-7339/ self
https://www.suse.com/security/cve/CVE-2014-0055/ self
https://www.suse.com/security/cve/CVE-2014-0069/ self
https://www.suse.com/security/cve/CVE-2014-0077/ self
https://www.suse.com/security/cve/CVE-2014-0101/ self
https://www.suse.com/security/cve/CVE-2014-0131/ self
https://www.suse.com/security/cve/CVE-2014-0155/ self
https://www.suse.com/security/cve/CVE-2014-0181/ self
https://www.suse.com/security/cve/CVE-2014-0196/ self
https://www.suse.com/security/cve/CVE-2014-1444/ self
https://www.suse.com/security/cve/CVE-2014-1445/ self
https://www.suse.com/security/cve/CVE-2014-1446/ self
https://www.suse.com/security/cve/CVE-2014-1737/ self
https://www.suse.com/security/cve/CVE-2014-1738/ self
https://www.suse.com/security/cve/CVE-2014-1739/ self
https://www.suse.com/security/cve/CVE-2014-1874/ self
https://www.suse.com/security/cve/CVE-2014-2309/ self
https://www.suse.com/security/cve/CVE-2014-2523/ self
https://www.suse.com/security/cve/CVE-2014-2678/ self
https://www.suse.com/security/cve/CVE-2014-2706/ self
https://www.suse.com/security/cve/CVE-2014-2851/ self
https://www.suse.com/security/cve/CVE-2014-3122/ self
https://www.suse.com/security/cve/CVE-2014-3144/ self
https://www.suse.com/security/cve/CVE-2014-3145/ self
https://www.suse.com/security/cve/CVE-2014-3153/ self
https://www.suse.com/security/cve/CVE-2014-3181/ self
https://www.suse.com/security/cve/CVE-2014-3184/ self
https://www.suse.com/security/cve/CVE-2014-3185/ self
https://www.suse.com/security/cve/CVE-2014-3186/ self
https://www.suse.com/security/cve/CVE-2014-3601/ self
https://www.suse.com/security/cve/CVE-2014-3610/ self
https://www.suse.com/security/cve/CVE-2014-3646/ self
https://www.suse.com/security/cve/CVE-2014-3647/ self
https://www.suse.com/security/cve/CVE-2014-3673/ self
https://www.suse.com/security/cve/CVE-2014-3687/ self
https://www.suse.com/security/cve/CVE-2014-3688/ self
https://www.suse.com/security/cve/CVE-2014-3690/ self
https://www.suse.com/security/cve/CVE-2014-3917/ self
https://www.suse.com/security/cve/CVE-2014-4027/ self
https://www.suse.com/security/cve/CVE-2014-4171/ self
https://www.suse.com/security/cve/CVE-2014-4508/ self
https://www.suse.com/security/cve/CVE-2014-4608/ self
https://www.suse.com/security/cve/CVE-2014-4652/ self
https://www.suse.com/security/cve/CVE-2014-4653/ self
https://www.suse.com/security/cve/CVE-2014-4654/ self
https://www.suse.com/security/cve/CVE-2014-4655/ self
https://www.suse.com/security/cve/CVE-2014-4656/ self
https://www.suse.com/security/cve/CVE-2014-4667/ self
https://www.suse.com/security/cve/CVE-2014-4699/ self
https://www.suse.com/security/cve/CVE-2014-4943/ self
https://www.suse.com/security/cve/CVE-2014-5077/ self
https://www.suse.com/security/cve/CVE-2014-5471/ self
https://www.suse.com/security/cve/CVE-2014-5472/ self
https://www.suse.com/security/cve/CVE-2014-6410/ self
https://www.suse.com/security/cve/CVE-2014-7822/ self
https://www.suse.com/security/cve/CVE-2014-7826/ self
https://www.suse.com/security/cve/CVE-2014-7841/ self
https://www.suse.com/security/cve/CVE-2014-7842/ self
https://www.suse.com/security/cve/CVE-2014-7970/ self
https://www.suse.com/security/cve/CVE-2014-8086/ self
https://www.suse.com/security/cve/CVE-2014-8133/ self
https://www.suse.com/security/cve/CVE-2014-8134/ self
https://www.suse.com/security/cve/CVE-2014-8159/ self
https://www.suse.com/security/cve/CVE-2014-8160/ self
https://www.suse.com/security/cve/CVE-2014-8369/ self
https://www.suse.com/security/cve/CVE-2014-8559/ self
https://www.suse.com/security/cve/CVE-2014-8709/ self
https://www.suse.com/security/cve/CVE-2014-8884/ self
https://www.suse.com/security/cve/CVE-2014-9090/ self
https://www.suse.com/security/cve/CVE-2014-9322/ self
https://www.suse.com/security/cve/CVE-2014-9419/ self
https://www.suse.com/security/cve/CVE-2014-9420/ self
https://www.suse.com/security/cve/CVE-2014-9529/ self
https://www.suse.com/security/cve/CVE-2014-9584/ self
https://www.suse.com/security/cve/CVE-2014-9585/ self
https://www.suse.com/security/cve/CVE-2014-9683/ self
https://www.suse.com/security/cve/CVE-2015-0777/ self
https://www.suse.com/security/cve/CVE-2015-1421/ self
https://www.suse.com/security/cve/CVE-2015-1593/ self
https://www.suse.com/security/cve/CVE-2015-2041/ self
https://www.suse.com/security/cve/CVE-2015-2042/ self
https://www.suse.com/security/cve/CVE-2015-2150/ self
https://www.suse.com/security/cve/CVE-2015-2830/ self
https://www.suse.com/security/cve/CVE-2015-2922/ self
https://www.suse.com/security/cve/CVE-2015-3331/ self
https://www.suse.com/security/cve/CVE-2015-3339/ self
https://www.suse.com/security/cve/CVE-2015-3636/ self
https://www.suse.com/security/cve/CVE-2012-2372 external
https://bugzilla.suse.com/767610 external
https://bugzilla.suse.com/795039 external
https://www.suse.com/security/cve/CVE-2012-4398 external
https://bugzilla.suse.com/778463 external
https://bugzilla.suse.com/779488 external
https://www.suse.com/security/cve/CVE-2013-1059 external
https://bugzilla.suse.com/826350 external
https://bugzilla.suse.com/882913 external
https://www.suse.com/security/cve/CVE-2013-1774 external
https://bugzilla.suse.com/806976 external
https://bugzilla.suse.com/807455 external
https://bugzilla.suse.com/871595 external
https://www.suse.com/security/cve/CVE-2013-1819 external
https://bugzilla.suse.com/807471 external
https://www.suse.com/security/cve/CVE-2013-1929 external
https://bugzilla.suse.com/813733 external
https://www.suse.com/security/cve/CVE-2013-1979 external
https://bugzilla.suse.com/816708 external
https://www.suse.com/security/cve/CVE-2013-2094 external
https://bugzilla.suse.com/819789 external
https://bugzilla.suse.com/820202 external
https://www.suse.com/security/cve/CVE-2013-2146 external
https://bugzilla.suse.com/825006 external
https://www.suse.com/security/cve/CVE-2013-2148 external
https://bugzilla.suse.com/823517 external
https://www.suse.com/security/cve/CVE-2013-2164 external
https://bugzilla.suse.com/824295 external
https://www.suse.com/security/cve/CVE-2013-2206 external
https://bugzilla.suse.com/781018 external
https://bugzilla.suse.com/826102 external
https://www.suse.com/security/cve/CVE-2013-2232 external
https://bugzilla.suse.com/827750 external
https://www.suse.com/security/cve/CVE-2013-2234 external
https://bugzilla.suse.com/827749 external
https://www.suse.com/security/cve/CVE-2013-2237 external
https://bugzilla.suse.com/828119 external
https://www.suse.com/security/cve/CVE-2013-2850 external
https://bugzilla.suse.com/821560 external
https://www.suse.com/security/cve/CVE-2013-2851 external
https://bugzilla.suse.com/822575 external
https://www.suse.com/security/cve/CVE-2013-2852 external
https://bugzilla.suse.com/822579 external
https://www.suse.com/security/cve/CVE-2013-2889 external
https://bugzilla.suse.com/835839 external
https://www.suse.com/security/cve/CVE-2013-2893 external
https://bugzilla.suse.com/835839 external
https://www.suse.com/security/cve/CVE-2013-2897 external
https://bugzilla.suse.com/1241174 external
https://bugzilla.suse.com/835839 external
https://www.suse.com/security/cve/CVE-2013-2899 external
https://bugzilla.suse.com/1241177 external
https://bugzilla.suse.com/835839 external
https://www.suse.com/security/cve/CVE-2013-2929 external
https://bugzilla.suse.com/824295 external
https://bugzilla.suse.com/847652 external
https://www.suse.com/security/cve/CVE-2013-2930 external
https://bugzilla.suse.com/849362 external
https://www.suse.com/security/cve/CVE-2013-3301 external
https://bugzilla.suse.com/815256 external
https://www.suse.com/security/cve/CVE-2013-4162 external
https://bugzilla.suse.com/831058 external
https://www.suse.com/security/cve/CVE-2013-4163 external
https://bugzilla.suse.com/831055 external
https://www.suse.com/security/cve/CVE-2013-4299 external
https://bugzilla.suse.com/846404 external
https://www.suse.com/security/cve/CVE-2013-4345 external
https://bugzilla.suse.com/840226 external
https://www.suse.com/security/cve/CVE-2013-4470 external
https://bugzilla.suse.com/847672 external
https://www.suse.com/security/cve/CVE-2013-4483 external
https://bugzilla.suse.com/848321 external
https://www.suse.com/security/cve/CVE-2013-4511 external
https://bugzilla.suse.com/849021 external
https://bugzilla.suse.com/850263 external
https://www.suse.com/security/cve/CVE-2013-4514 external
https://bugzilla.suse.com/849029 external
https://www.suse.com/security/cve/CVE-2013-4515 external
https://bugzilla.suse.com/849034 external
https://bugzilla.suse.com/850263 external
https://www.suse.com/security/cve/CVE-2013-4579 external
https://bugzilla.suse.com/851426 external
https://www.suse.com/security/cve/CVE-2013-4587 external
https://bugzilla.suse.com/853050 external
https://bugzilla.suse.com/882914 external
https://www.suse.com/security/cve/CVE-2013-4592 external
https://bugzilla.suse.com/851101 external
https://www.suse.com/security/cve/CVE-2013-6367 external
https://bugzilla.suse.com/853051 external
https://www.suse.com/security/cve/CVE-2013-6368 external
https://bugzilla.suse.com/853052 external
https://www.suse.com/security/cve/CVE-2013-6376 external
https://bugzilla.suse.com/853053 external
https://www.suse.com/security/cve/CVE-2013-6378 external
https://bugzilla.suse.com/852559 external
https://www.suse.com/security/cve/CVE-2013-6380 external
https://bugzilla.suse.com/852373 external
https://www.suse.com/security/cve/CVE-2013-6382 external
https://bugzilla.suse.com/852553 external
https://www.suse.com/security/cve/CVE-2013-6383 external
https://bugzilla.suse.com/852558 external
https://www.suse.com/security/cve/CVE-2013-6463 external
https://bugzilla.suse.com/854722 external
https://bugzilla.suse.com/857643 external
https://www.suse.com/security/cve/CVE-2013-6885 external
https://bugzilla.suse.com/849668 external
https://bugzilla.suse.com/852967 external
https://bugzilla.suse.com/853049 external
https://www.suse.com/security/cve/CVE-2013-7027 external
https://bugzilla.suse.com/854634 external
https://www.suse.com/security/cve/CVE-2013-7263 external
https://bugzilla.suse.com/853040 external
https://bugzilla.suse.com/857643 external
https://www.suse.com/security/cve/CVE-2013-7264 external
https://bugzilla.suse.com/853040 external
https://bugzilla.suse.com/857643 external
https://www.suse.com/security/cve/CVE-2013-7265 external
https://bugzilla.suse.com/853040 external
https://bugzilla.suse.com/857643 external
https://www.suse.com/security/cve/CVE-2013-7339 external
https://bugzilla.suse.com/869563 external
https://www.suse.com/security/cve/CVE-2014-0055 external
https://bugzilla.suse.com/870173 external
https://www.suse.com/security/cve/CVE-2014-0069 external
https://bugzilla.suse.com/864025 external
https://www.suse.com/security/cve/CVE-2014-0077 external
https://bugzilla.suse.com/870173 external
https://bugzilla.suse.com/870576 external
https://www.suse.com/security/cve/CVE-2014-0101 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/866102 external
https://www.suse.com/security/cve/CVE-2014-0131 external
https://bugzilla.suse.com/824295 external
https://bugzilla.suse.com/867723 external
https://bugzilla.suse.com/869564 external
https://bugzilla.suse.com/889071 external
https://www.suse.com/security/cve/CVE-2014-0155 external
https://bugzilla.suse.com/824295 external
https://bugzilla.suse.com/872540 external
https://www.suse.com/security/cve/CVE-2014-0181 external
https://bugzilla.suse.com/875051 external
https://www.suse.com/security/cve/CVE-2014-0196 external
https://bugzilla.suse.com/871252 external
https://bugzilla.suse.com/875690 external
https://bugzilla.suse.com/877345 external
https://bugzilla.suse.com/879878 external
https://bugzilla.suse.com/933423 external
https://www.suse.com/security/cve/CVE-2014-1444 external
https://bugzilla.suse.com/858869 external
https://www.suse.com/security/cve/CVE-2014-1445 external
https://bugzilla.suse.com/858870 external
https://www.suse.com/security/cve/CVE-2014-1446 external
https://bugzilla.suse.com/858872 external
https://www.suse.com/security/cve/CVE-2014-1737 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/875798 external
https://bugzilla.suse.com/877345 external
https://www.suse.com/security/cve/CVE-2014-1738 external
https://bugzilla.suse.com/875798 external
https://bugzilla.suse.com/877345 external
https://www.suse.com/security/cve/CVE-2014-1739 external
https://bugzilla.suse.com/882804 external
https://www.suse.com/security/cve/CVE-2014-1874 external
https://bugzilla.suse.com/863335 external
https://www.suse.com/security/cve/CVE-2014-2309 external
https://bugzilla.suse.com/824295 external
https://bugzilla.suse.com/867531 external
https://www.suse.com/security/cve/CVE-2014-2523 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/868653 external
https://www.suse.com/security/cve/CVE-2014-2678 external
https://bugzilla.suse.com/871561 external
https://www.suse.com/security/cve/CVE-2014-2706 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/871797 external
https://www.suse.com/security/cve/CVE-2014-2851 external
https://bugzilla.suse.com/824295 external
https://bugzilla.suse.com/873374 external
https://www.suse.com/security/cve/CVE-2014-3122 external
https://bugzilla.suse.com/824295 external
https://bugzilla.suse.com/876102 external
https://www.suse.com/security/cve/CVE-2014-3144 external
https://bugzilla.suse.com/824295 external
https://bugzilla.suse.com/877257 external
https://bugzilla.suse.com/889071 external
https://www.suse.com/security/cve/CVE-2014-3145 external
https://bugzilla.suse.com/824295 external
https://bugzilla.suse.com/877257 external
https://www.suse.com/security/cve/CVE-2014-3153 external
https://bugzilla.suse.com/877775 external
https://bugzilla.suse.com/880892 external
https://bugzilla.suse.com/882228 external
https://www.suse.com/security/cve/CVE-2014-3181 external
https://bugzilla.suse.com/896382 external
https://www.suse.com/security/cve/CVE-2014-3184 external
https://bugzilla.suse.com/896390 external
https://www.suse.com/security/cve/CVE-2014-3185 external
https://bugzilla.suse.com/896391 external
https://www.suse.com/security/cve/CVE-2014-3186 external
https://bugzilla.suse.com/896392 external
https://www.suse.com/security/cve/CVE-2014-3601 external
https://bugzilla.suse.com/892782 external
https://bugzilla.suse.com/902675 external
https://www.suse.com/security/cve/CVE-2014-3610 external
https://bugzilla.suse.com/899192 external
https://www.suse.com/security/cve/CVE-2014-3646 external
https://bugzilla.suse.com/899192 external
https://www.suse.com/security/cve/CVE-2014-3647 external
https://bugzilla.suse.com/1013038 external
https://bugzilla.suse.com/1134834 external
https://bugzilla.suse.com/899192 external
https://www.suse.com/security/cve/CVE-2014-3673 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/902346 external
https://bugzilla.suse.com/902349 external
https://bugzilla.suse.com/904899 external
https://www.suse.com/security/cve/CVE-2014-3687 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/902349 external
https://bugzilla.suse.com/904899 external
https://bugzilla.suse.com/909208 external
https://www.suse.com/security/cve/CVE-2014-3688 external
https://bugzilla.suse.com/902351 external
https://www.suse.com/security/cve/CVE-2014-3690 external
https://bugzilla.suse.com/902232 external
https://www.suse.com/security/cve/CVE-2014-3917 external
https://bugzilla.suse.com/880484 external
https://www.suse.com/security/cve/CVE-2014-4027 external
https://bugzilla.suse.com/882639 external
https://www.suse.com/security/cve/CVE-2014-4171 external
https://bugzilla.suse.com/883518 external
https://www.suse.com/security/cve/CVE-2014-4508 external
https://bugzilla.suse.com/883724 external
https://www.suse.com/security/cve/CVE-2014-4608 external
https://bugzilla.suse.com/883948 external
https://bugzilla.suse.com/889071 external
https://www.suse.com/security/cve/CVE-2014-4652 external
https://bugzilla.suse.com/883795 external
https://www.suse.com/security/cve/CVE-2014-4653 external
https://bugzilla.suse.com/883795 external
https://www.suse.com/security/cve/CVE-2014-4654 external
https://bugzilla.suse.com/883795 external
https://www.suse.com/security/cve/CVE-2014-4655 external
https://bugzilla.suse.com/883795 external
https://www.suse.com/security/cve/CVE-2014-4656 external
https://bugzilla.suse.com/883795 external
https://www.suse.com/security/cve/CVE-2014-4667 external
https://bugzilla.suse.com/885422 external
https://www.suse.com/security/cve/CVE-2014-4699 external
https://bugzilla.suse.com/885725 external
https://www.suse.com/security/cve/CVE-2014-4943 external
https://bugzilla.suse.com/887082 external
https://www.suse.com/security/cve/CVE-2014-5077 external
https://bugzilla.suse.com/889173 external
https://www.suse.com/security/cve/CVE-2014-5471 external
https://bugzilla.suse.com/892490 external
https://www.suse.com/security/cve/CVE-2014-5472 external
https://bugzilla.suse.com/892490 external
https://www.suse.com/security/cve/CVE-2014-6410 external
https://bugzilla.suse.com/896689 external
https://www.suse.com/security/cve/CVE-2014-7822 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/915322 external
https://bugzilla.suse.com/915517 external
https://bugzilla.suse.com/939240 external
https://www.suse.com/security/cve/CVE-2014-7826 external
https://bugzilla.suse.com/904012 external
https://bugzilla.suse.com/904013 external
https://www.suse.com/security/cve/CVE-2014-7841 external
https://bugzilla.suse.com/904899 external
https://bugzilla.suse.com/905100 external
https://www.suse.com/security/cve/CVE-2014-7842 external
https://bugzilla.suse.com/905312 external
https://bugzilla.suse.com/907822 external
https://www.suse.com/security/cve/CVE-2014-7970 external
https://bugzilla.suse.com/900644 external
https://www.suse.com/security/cve/CVE-2014-8086 external
https://bugzilla.suse.com/900881 external
https://www.suse.com/security/cve/CVE-2014-8133 external
https://bugzilla.suse.com/817142 external
https://bugzilla.suse.com/906545 external
https://bugzilla.suse.com/907818 external
https://bugzilla.suse.com/909077 external
https://www.suse.com/security/cve/CVE-2014-8134 external
https://bugzilla.suse.com/907818 external
https://bugzilla.suse.com/909077 external
https://bugzilla.suse.com/909078 external
https://www.suse.com/security/cve/CVE-2014-8159 external
https://bugzilla.suse.com/903967 external
https://bugzilla.suse.com/914742 external
https://bugzilla.suse.com/939241 external
https://www.suse.com/security/cve/CVE-2014-8160 external
https://bugzilla.suse.com/857643 external
https://bugzilla.suse.com/913059 external
https://www.suse.com/security/cve/CVE-2014-8369 external
https://bugzilla.suse.com/892782 external
https://bugzilla.suse.com/902675 external
https://www.suse.com/security/cve/CVE-2014-8559 external
https://bugzilla.suse.com/903640 external
https://bugzilla.suse.com/915517 external
https://www.suse.com/security/cve/CVE-2014-8709 external
https://bugzilla.suse.com/904700 external
https://www.suse.com/security/cve/CVE-2014-8884 external
https://bugzilla.suse.com/904876 external
https://bugzilla.suse.com/905522 external
https://bugzilla.suse.com/905739 external
https://bugzilla.suse.com/905744 external
https://bugzilla.suse.com/905748 external
https://bugzilla.suse.com/905764 external
https://www.suse.com/security/cve/CVE-2014-9090 external
https://bugzilla.suse.com/817142 external
https://bugzilla.suse.com/907818 external
https://bugzilla.suse.com/909077 external
https://bugzilla.suse.com/910251 external
https://www.suse.com/security/cve/CVE-2014-9322 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/817142 external
https://bugzilla.suse.com/910251 external
https://www.suse.com/security/cve/CVE-2014-9419 external
https://bugzilla.suse.com/911326 external
https://www.suse.com/security/cve/CVE-2014-9420 external
https://bugzilla.suse.com/906545 external
https://bugzilla.suse.com/911325 external
https://www.suse.com/security/cve/CVE-2014-9529 external
https://bugzilla.suse.com/1072204 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/912202 external
https://www.suse.com/security/cve/CVE-2014-9584 external
https://bugzilla.suse.com/912654 external
https://www.suse.com/security/cve/CVE-2014-9585 external
https://bugzilla.suse.com/912705 external
https://www.suse.com/security/cve/CVE-2014-9683 external
https://bugzilla.suse.com/918333 external
https://www.suse.com/security/cve/CVE-2015-0777 external
https://bugzilla.suse.com/917830 external
https://www.suse.com/security/cve/CVE-2015-1421 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/915577 external
https://bugzilla.suse.com/922004 external
https://bugzilla.suse.com/939261 external
https://www.suse.com/security/cve/CVE-2015-1593 external
https://bugzilla.suse.com/1044934 external
https://bugzilla.suse.com/917839 external
https://www.suse.com/security/cve/CVE-2015-2041 external
https://bugzilla.suse.com/903967 external
https://bugzilla.suse.com/919007 external
https://www.suse.com/security/cve/CVE-2015-2042 external
https://bugzilla.suse.com/903967 external
https://bugzilla.suse.com/919018 external
https://www.suse.com/security/cve/CVE-2015-2150 external
https://bugzilla.suse.com/800280 external
https://bugzilla.suse.com/903967 external
https://bugzilla.suse.com/919463 external
https://www.suse.com/security/cve/CVE-2015-2830 external
https://bugzilla.suse.com/903967 external
https://bugzilla.suse.com/926240 external
https://www.suse.com/security/cve/CVE-2015-2922 external
https://bugzilla.suse.com/903967 external
https://bugzilla.suse.com/922583 external
https://bugzilla.suse.com/926223 external
https://www.suse.com/security/cve/CVE-2015-3331 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/927257 external
https://bugzilla.suse.com/931231 external
https://bugzilla.suse.com/939262 external
https://www.suse.com/security/cve/CVE-2015-3339 external
https://bugzilla.suse.com/903967 external
https://bugzilla.suse.com/928130 external
https://bugzilla.suse.com/939263 external
https://www.suse.com/security/cve/CVE-2015-3636 external
https://bugzilla.suse.com/929525 external
https://bugzilla.suse.com/939277 external
https://bugzilla.suse.com/994624 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for Linux kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix \nvarious bugs and security issues.\n\nThe following security bugs have been fixed:\n\n    * \n\n      CVE-2014-1739: The media_device_enum_entities function in\n      drivers/media/media-device.c in the Linux kernel before 3.14.6 does\n      not initialize a certain data structure, which allows local users to\n      obtain sensitive information from kernel memory by leveraging\n      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call\n      (bnc#882804).\n\n    * \n\n      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not\n      properly implement the interaction between range notification and\n      hole punching, which allows local users to cause a denial of service\n      (i_mutex hold) by using the mmap system call to access a hole, as\n      demonstrated by interfering with intended shmem activity by blocking\n      completion of (1) an MADV_REMOVE madvise call or (2) an\n      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).\n\n    * \n\n      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through\n      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and\n      the sep CPU feature flag is set, allows local users to cause a denial\n      of service (OOPS and system crash) via an invalid syscall number, as\n      demonstrated by number 1000 (bnc#883724).\n\n    * \n\n      CVE-2014-4667: The sctp_association_free function in\n      net/sctp/associola.c in the Linux kernel before 3.15.2 does not\n      properly manage a certain backlog value, which allows remote\n      attackers to cause a denial of service (socket outage) via a crafted\n      SCTP packet (bnc#885422).\n\n    * \n\n      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the\n      Linux kernel through 3.15.6 allows local users to gain privileges by\n      leveraging data-structure differences between an l2tp socket and an\n      inet socket (bnc#887082).\n\n    * \n\n      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c\n      in the Linux kernel through 3.15.8, when SCTP authentication is\n      enabled, allows remote attackers to cause a denial of service (NULL\n      pointer dereference and OOPS) by starting to establish an association\n      between two endpoints immediately after an exchange of INIT and INIT\n      ACK chunks to establish an earlier association between these\n      endpoints in the opposite direction (bnc#889173).\n\n    * \n\n      CVE-2014-5471: Stack consumption vulnerability in the\n      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the\n      Linux kernel through 3.16.1 allows local users to cause a denial of\n      service (uncontrolled recursion, and system crash or reboot) via a\n      crafted iso9660 image with a CL entry referring to a directory entry\n      that has a CL entry. (bnc#892490)\n\n    * \n\n      CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users\n      to cause a denial of service (unkillable mount process) via a crafted\n      iso9660 image with a self-referential CL entry. (bnc#892490)\n\n    * \n\n      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n      kernel before 3.13.7 allows remote attackers to cause a denial of\n      service (system crash) via network traffic that improperly interacts\n      with the WLAN_STA_PS_STA state (aka power-save mode), related to\n      sta_info.c and tx.c. (bnc#871797)\n\n    * \n\n      CVE-2014-4027: The rd_build_device_space function in\n      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does\n      not properly initialize a certain data structure, which allows local\n      users to obtain sensitive information from ramdisk_mcp memory by\n      leveraging access to a SCSI initiator. (bnc#882639)\n\n    * \n\n      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the\n      Linux kernel through 3.14.5 does not ensure that calls have two\n      different futex addresses, which allows local users to gain\n      privileges via a crafted FUTEX_REQUEUE command that facilitates\n      unsafe waiter modification. (bnc#880892)\n\n    * \n\n      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs\n      (bnc#896689)\n\nThe following non-security bugs have been fixed:\n\n    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).\n    * ACPI: Fix bug when ACPI reset register is implemented in system\n      memory (bnc#882900).\n    * ACPI: Limit access to custom_method (bnc#884333).\n    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).\n    * Add option to automatically enforce module signatures when in Secure\n      Boot mode (bnc#884333).\n    * Add secure_modules() call (bnc#884333).\n    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).\n    * Backported new patches of Lock down functions for UEFI secure boot\n      Also updated series.conf and removed old patches.\n    * Btrfs: Return EXDEV for cross file system snapshot.\n    * Btrfs: abort the transaction when we does not find our extent ref.\n    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.\n    * Btrfs: cancel scrub on transaction abortion.\n    * Btrfs: correctly set profile flags on seqlock retry.\n    * Btrfs: does not check nodes for extent items.\n    * Btrfs: fix a possible deadlock between scrub and transaction\n      committing.\n    * Btrfs: fix corruption after write/fsync failure + fsync + log\n      recovery (bnc#894200).\n    * Btrfs: fix csum tree corruption, duplicate and outdated checksums\n      (bnc#891619).\n    * Btrfs: fix double free in find_lock_delalloc_range.\n    * Btrfs: fix possible memory leak in btrfs_create_tree().\n    * Btrfs: fix use of uninit \u0027ret\u0027 in end_extent_writepage().\n    * Btrfs: free delayed node outside of root-\u003einode_lock (bnc#866864).\n    * Btrfs: make DEV_INFO ioctl available to anyone.\n    * Btrfs: make FS_INFO ioctl available to anyone.\n    * Btrfs: make device scan less noisy.\n    * Btrfs: make sure there are not any read requests before stopping\n      workers.\n    * Btrfs: more efficient io tree navigation on wait_extent_bit.\n    * Btrfs: output warning instead of error when loading free space cache\n      failed.\n    * Btrfs: retrieve more info from FS_INFO ioctl.\n    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).\n    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol\n      (bnc#866615).\n    * Btrfs: use right type to get real comparison.\n    * Btrfs: wake up @scrub_pause_wait as much as we can.\n    * Btrfs: wake up transaction thread upon remount.\n    * CacheFiles: Add missing retrieval completions (bnc#880344).\n    * CacheFiles: Does not try to dump the index key if the cookie has been\n      cleared (bnc#880344).\n    * CacheFiles: Downgrade the requirements passed to the allocator\n      (bnc#880344).\n    * CacheFiles: Fix the marking of cached pages (bnc#880344).\n    * CacheFiles: Implement invalidation (bnc#880344).\n    * CacheFiles: Make some debugging statements conditional (bnc#880344).\n    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).\n    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code\n      (bnc#886840).\n    * FS-Cache: Add transition to handle invalidate immediately after\n      lookup (bnc#880344).\n    * FS-Cache: Check that there are no read ops when cookie relinquished\n      (bnc#880344).\n    * FS-Cache: Clear remaining page count on retrieval cancellation\n      (bnc#880344).\n    * FS-Cache: Convert the object event ID #defines into an enum\n      (bnc#880344).\n    * FS-Cache: Does not sleep in page release if __GFP_FS is not set\n      (bnc#880344).\n    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).\n    * FS-Cache: Exclusive op submission can BUG if there is been an I/O\n      error (bnc#880344).\n    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the\n      counter != 0 (bnc#880344).\n    * FS-Cache: Fix object state machine to have separate work and wait\n      states (bnc#880344).\n    * FS-Cache: Fix operation state management and accounting (bnc#880344).\n    * FS-Cache: Fix signal handling during waits (bnc#880344).\n    * FS-Cache: Initialise the object event mask with the calculated mask\n      (bnc#880344).\n    * FS-Cache: Limit the number of I/O error reports for a cache\n      (bnc#880344).\n    * FS-Cache: Make cookie relinquishment wait for outstanding reads\n      (bnc#880344).\n    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).\n    * FS-Cache: One of the write operation paths doeses not set the object\n      state (bnc#880344).\n    * FS-Cache: Provide proper invalidation (bnc#880344).\n    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops\n      (bnc#880344).\n    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t\n      (bnc#880344).\n    * FS-Cache: Uninline fscache_object_init() (bnc#880344).\n    * FS-Cache: Wrap checks on object state (bnc#880344).\n    * HID: usbhid: add always-poll quirk (bnc#888607).\n    * HID: usbhid: enable always-poll quirk for Elan Touchscreen\n      (bnc#888607).\n    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).\n    * Ignore \u0027flags\u0027 change to event_constraint (bnc#876114).\n    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).\n    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).\n    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).\n    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).\n    * NFS: Does not use a delegation to open a file when returning that\n      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)\n    * NFS: Fixes for NFS RCU-walk support in line with code going upstream\n    * NFS: Use FS-Cache invalidation (bnc#880344).\n    * NFS: allow lockless access to access_cache (bnc#866130).\n    * NFS: avoid mountpoint being displayed as \u0027 (deleted)\u0027 in /proc/mounts\n      (bnc#888591).\n    * NFS: nfs4_do_open should add negative results to the dcache\n      (bnc#866130).\n    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a\n      page (bnc#880344).\n    * NFS: nfs_open_revalidate: only evaluate parent if it will be used\n      (bnc#866130).\n    * NFS: prepare for RCU-walk support but pushing tests later in code\n      (bnc#866130).\n    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).\n    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).\n    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).\n    * NFSD: Does not hand out delegations for 30 seconds after recalling\n      them (bnc#880370).\n    * NFSv4 set open access operation call flag in nfs4_init_opendata_res\n      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).\n    * NFSv4: Add a helper for encoding opaque data (bnc#888968).\n    * NFSv4: Add a helper for encoding stateids (bnc#888968).\n    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).\n    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).\n    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).\n    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).\n    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an\n      error (bnc#888968).\n    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).\n    * NFSv4: The stateid must remain the same for replayed RPC calls\n      (bnc#888968).\n    * NFSv4: nfs4_stateid_is_current should return \u0027true\u0027 for an invalid\n      stateid (bnc#888968).\n    * One more fix for kABI breakage.\n    * PCI: Lock down BAR access when module security is enabled\n      (bnc#884333).\n    * PCI: enable MPS \u0027performance\u0027 setting to properly handle bridge MPS\n      (bnc#883376).\n    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).\n    * PM / Hibernate: Create a Radix-Tree to store memory bitmap\n      (bnc#860441).\n    * PM / Hibernate: Implement position keeping in radix tree\n      (bnc#860441).\n    * PM / Hibernate: Iterate over set bits instead of PFNs in\n      swsusp_free() (bnc#860441).\n    * PM / Hibernate: Remove the old memory-bitmap implementation\n      (bnc#860441).\n    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node\n      (bnc#860441).\n    * Restrict /dev/mem and /dev/kmem when module loading is restricted\n      (bnc#884333).\n    * Reuse existing \u0027state\u0027 field to indicate PERF_X86_EVENT_PEBS_LDLAT\n      (bnc#876114).\n    * USB: handle LPM errors during device suspend correctly (bnc#849123).\n    * Update kabi files to reflect fscache change (bnc#880344)\n    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)\n    * VFS: Make more complete truncate operation available to CacheFiles\n      (bnc#880344).\n    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,\n      ltc#83367).\n    * acpi: Ignore acpi_rsdp kernel parameter when module loading is\n      restricted (bnc#884333).\n    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,\n      LTC#111728).\n    * asus-wmi: Restrict debugfs interface when module loading is\n      restricted (bnc#884333).\n    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).\n    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).\n    * autofs4: does not take spinlock when not needed in\n      autofs4_lookup_expiring (bnc#866130).\n    * autofs4: factor should_expire() out of autofs4_expire_indirect\n      (bnc#866130).\n    * autofs4: make \u0027autofs4_can_expire\u0027 idempotent (bnc#866130).\n    * autofs4: remove a redundant assignment (bnc#866130).\n    * autofs: fix lockref lookup (bnc#888591).\n    * be2net: add dma_mapping_error() check for dma_map_page()\n      (bnc#881759).\n    * block: add cond_resched() to potentially long running ioctl discard\n      loop (bnc#884725).\n    * block: fix race between request completion and timeout handling\n      (bnc#881051).\n    * cdc-ether: clean packet filter upon probe (bnc#876017).\n    * cpuset: Fix memory allocator deadlock (bnc#876590).\n    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs\n      have them, but some are FIPS certified, with some kernel support.\n    * crypto: fips - only panic on bad/missing crypto mod signatures\n      (bnc#887503).\n    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips\n      mode (bnc#889451).\n    * dasd: validate request size before building CCW/TCW (bnc#891087,\n      LTC#114068).\n    * dm mpath: fix race condition between multipath_dtr and pg_init_done\n      (bnc#826486).\n    * dm-mpath: fix panic on deleting sg device (bnc#870161).\n    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).\n    * drm/ast: Actually load DP501 firmware when required (bnc#895608\n      bnc#871134).\n    * drm/ast: Add missing entry to dclk_table[].\n    * drm/ast: Add reduced non reduced mode parsing for wide screen mode\n      (bnc#892723).\n    * drm/ast: initial DP501 support (v0.2) (bnc#871134).\n    * drm/ast: open key before detect chips (bnc#895983).\n    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).\n    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).\n    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init\n      (bnc#869055).\n    * drm/i915: create functions for the \u0027unclaimed register\u0027 checks\n      (bnc#869055).\n    * drm/i915: use FPGA_DBG for the \u0027unclaimed register\u0027 checks\n      (bnc#869055).\n    * drm/mgag200: Initialize data needed to map fbdev memory (bnc\n      #806990).\n    * e1000e: enable support for new device IDs (bnc#885509).\n    * fs/fscache: remove spin_lock() from the condition in while()\n      (bnc#880344).\n    * hibernate: Disable in a signed modules environment (bnc#884333).\n    * hugetlb: does not use ERR_PTR with VM_FAULT* values\n    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).\n    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).\n    * inet: add a redirect generation id in inetpeer (bnc#860593).\n    * inetpeer: initialize -\u003eredirect_genid in inet_getpeer() (bnc#860593).\n    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).\n    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base\n      (bnc#860593).\n    * kernel: 3215 tty hang (bnc#891087, LTC#114562).\n    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,\n      LTC#114480).\n    * kernel: fix kernel oops with load of fpc register (bnc#889061,\n      LTC#113596).\n    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).\n    * kexec: Disable at runtime if the kernel enforces module loading\n      restrictions (bnc#884333).\n    * md/raid6: avoid data corruption during recovery of double-degraded\n      RAID6.\n    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim\n      fix).\n    * memcg: do not expose uninitialized mem_cgroup_per_node to world\n      (bnc#883096).\n    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()\n    * mm, hugetlb: change variable name reservations to resv\n    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache\n    * mm, hugetlb: defer freeing pages when gathering surplus pages\n    * mm, hugetlb: do not use a page in page cache for cow optimization\n    * mm, hugetlb: fix and clean-up node iteration code to alloc or free\n    * mm, hugetlb: fix race in region tracking\n    * mm, hugetlb: fix subpool accounting handling\n    * mm, hugetlb: improve page-fault scalability\n    * mm, hugetlb: improve, cleanup resv_map parameters\n    * mm, hugetlb: move up the code which check availability of free huge\n      page\n    * mm, hugetlb: protect reserved pages when soft offlining a hugepage\n    * mm, hugetlb: remove decrement_hugepage_resv_vma()\n    * mm, hugetlb: remove redundant list_empty check in\n      gather_surplus_pages()\n    * mm, hugetlb: remove resv_map_put\n    * mm, hugetlb: remove useless check about mapping type\n    * mm, hugetlb: return a reserved page to a reserved pool if failed\n    * mm, hugetlb: trivial commenting fix\n    * mm, hugetlb: unify region structure handling\n    * mm, hugetlb: unify region structure handling kabi\n    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb\n      Fault Scalability).\n    * mm, hugetlb: use vma_resv_map() map types\n    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).\n    * mm, oom: normalize oom scores to oom_score_adj scale only for\n      userspace (bnc#884582, bnc#884767).\n    * mm, thp: do not allow thp faults to avoid cpuset restrictions\n      (bnc#888849).\n    * net/mlx4_core: Load higher level modules according to ports type\n      (bnc#887680).\n    * net/mlx4_core: Load the IB driver when the device supports IBoE\n      (bnc#887680).\n    * net/mlx4_en: Fix a race between napi poll function and RX ring\n      cleanup (bnc#863586).\n    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).\n    * net: fix checksumming features handling in output path (bnc#891259).\n    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).\n    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim\n      fix (bnc#895680).\n    * perf/core: Add weighted samples (bnc#876114).\n    * perf/x86: Add flags to event constraints (bnc#876114).\n    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).\n    * perf: Add generic memory sampling interface (bnc#876114).\n    * qla2xxx: Avoid escalating the SCSI error handler if the command is\n      not found in firmware (bnc#859840).\n    * qla2xxx: Clear loop_id for ports that are marked lost during fabric\n      scanning (bnc#859840).\n    * qla2xxx: Does not check for firmware hung during the reset context\n      for ISP82XX (bnc#859840).\n    * qla2xxx: Issue abort command for outstanding commands during cleanup\n      when only firmware is alive (bnc#859840).\n    * qla2xxx: Reduce the time we wait for a command to complete during\n      SCSI error handling (bnc#859840).\n    * qla2xxx: Set host can_queue value based on available resources\n      (bnc#859840).\n    * restore smp_mb() in unlock_new_inode() (bnc#890526).\n    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,\n      LTC#113725).\n    * sched: fix the theoretical signal_wake_up() vs schedule() race\n      (bnc#876055).\n    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n      LTC#112035).\n    * scsi_dh: use missing accessor \u0027scsi_device_from_queue\u0027 (bnc#889614).\n    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).\n    * scsiback: correct grant page unmapping.\n    * scsiback: fix retry handling in __report_luns().\n    * scsiback: free resources after error.\n    * sunrpc/auth: allow lockless (rcu) lookup of credential cache\n      (bnc#866130).\n    * supported.conf: remove external from drivers/net/veth (bnc#889727)\n    * supported.conf: support net/sched/act_police.ko (bnc#890426)\n    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).\n    * tg3: Change nvram command timeout value to 50ms (bnc#855657).\n    * tg3: Override clock, link aware and link idle mode during NVRAM dump\n      (bnc#855657).\n    * tg3: Set the MAC clock to the fastest speed during boot code load\n      (bnc#855657).\n    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).\n    * usbcore: Does not log on consecutive debounce failures of the same\n      port (bnc#888105).\n    * usbhid: fix PIXART optical mouse (bnc#888607).\n    * uswsusp: Disable when module loading is restricted (bnc#884333).\n    * vscsi: support larger transfer sizes (bnc#774818).\n    * writeback: Do not sync data dirtied after sync start (bnc#833820).\n    * x86 thermal: Delete power-limit-notification console messages\n      (bnc#882317).\n    * x86 thermal: Disable power limit notification interrupt by default\n      (bnc#882317).\n    * x86 thermal: Re-enable power limit notification interrupt by default\n      (bnc#882317).\n    * x86, cpu hotplug: Fix stack frame warning in\n      check_irq_vectors_for_cpu_disable() (bnc#887418).\n    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).\n    * x86/UV: Add kdump to UV NMI handler (bnc#888847).\n    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).\n    * x86/UV: Move NMI support (bnc#888847).\n    * x86/UV: Update UV support for external NMI signals (bnc#888847).\n    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).\n    * x86: Add check for number of available vectors before CPU down\n      (bnc#887418).\n    * x86: Lock down IO port access when module security is enabled\n      (bnc#884333).\n    * x86: Restrict MSR access when module loading is restricted\n      (bnc#884333).\n\nSecurity Issues:\n\n    * CVE-2013-1979\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\u003e\n    * CVE-2014-1739\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\u003e\n    * CVE-2014-2706\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\u003e\n    * CVE-2014-4027\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\u003e\n    * CVE-2014-4171\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\u003e\n    * CVE-2014-4508\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\u003e\n    * CVE-2014-4667\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\u003e\n    * CVE-2014-4943\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\u003e\n    * CVE-2014-5077\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\u003e\n    * CVE-2014-5471\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\u003e\n    * CVE-2014-5472\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\u003e\n    * CVE-2014-3153\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\u003e\n    * CVE-2014-6410\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\u003e\n\nThe SUSE Linux Enterprise 11 Service Pack 3 RealTime Extension kernel was \nupdated to fix various bugs and security issues.\n\nFollowing security bugs were fixed: CVE-2013-1979: The scm_set_cred \nfunction in include/net/scm.h in the Linux kernel before 3.8.11 uses \nincorrect uid and gid values during credentials passing, which allows local \nusers to gain privileges via a crafted application (bnc#816708).\n\nCVE-2014-1739: The media_device_enum_entities function in \ndrivers/media/media-device.c in the Linux kernel before 3.14.6 does not \ninitialize a certain data structure, which allows local users to obtain \nsensitive information from kernel memory by leveraging /dev/media0 read \naccess for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).\n\nCVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not \nproperly implement the interaction between range notification and hole \npunching, which allows local users to cause a denial of service (i_mutex \nhold) by using the mmap system call to access a hole, as demonstrated by \ninterfering with intended shmem activity by blocking completion of (1) an \nMADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call \n(bnc#883518).\n\nCVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through \n3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the \nsep CPU feature flag is set, allows local users to cause a denial of \nservice (OOPS and system crash) via an invalid syscall number, as \ndemonstrated by number 1000 (bnc#883724).\n\nCVE-2014-4667: The sctp_association_free function in net/sctp/associola.c \nin the Linux kernel before 3.15.2 does not properly manage a certain \nbacklog value, which allows remote attackers to cause a denial of service \n(socket outage) via a crafted SCTP packet (bnc#885422).\n\nCVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux \nkernel through 3.15.6 allows local users to gain privileges by leveraging \ndata-structure differences between an l2tp socket and an inet socket \n(bnc#887082).\n\nCVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in \nthe Linux kernel through 3.15.8, when SCTP authentication is enabled, \nallows remote attackers to cause a denial of service (NULL pointer \ndereference and OOPS) by starting to establish an association between two \nendpoints immediately after an exchange of INIT and INIT ACK chunks to \nestablish an earlier association between these endpoints in the opposite \ndirection (bnc#889173).\n\nCVE-2014-5471: Stack consumption vulnerability in the \nparse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux \nkernel through 3.16.1 allows local users to cause a denial of service \n(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 \nimage with a CL entry referring to a directory entry that has a CL entry. \n(bnc#892490)\n\nCVE-2014-5472: The parse_rock_ridge_inode_internal function in \nfs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to \ncause a denial of service (unkillable mount process) via a crafted iso9660 \nimage with a self-referential CL entry. (bnc#892490)\n\nCVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel \nbefore 3.13.7 allows remote attackers to cause a denial of service (system \ncrash) via network traffic that improperly interacts with the \nWLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and \ntx.c. (bnc#871797)\n\nCVE-2014-4027: The rd_build_device_space function in \ndrivers/target/target_core_rd.c in the Linux kernel before 3.14 does not \nproperly initialize a certain data structure, which allows local users to \nobtain sensitive information from ramdisk_mcp memory by leveraging access \nto a SCSI initiator. (bnc#882639)\n\nCVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux \nkernel through 3.14.5 does not ensure that calls have two different futex \naddresses, which allows local users to gain privileges via a crafted \nFUTEX_REQUEUE command that facilitates unsafe waiter modification. \n(bnc#880892)\n\nCVE-2014-6410: Avoid infinite loop when processing indirect ICBs \n(bnc#896689)\n\nThe following non-security bugs were fixed: - ACPI / PAD: call schedule() \nwhen need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset \nregister is implemented in system memory (bnc#882900). - ACPI: Limit access \nto custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec \n(bnc#891746). - Add option to automatically enforce module signatures when \nin Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). \n- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported \nnew patches of Lock down functions for UEFI secure boot Also updated \nseries.conf and removed old patches. - Btrfs: Return EXDEV for cross file \nsystem snapshot. - Btrfs: abort the transaction when we does not find our \nextent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - \nBtrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile \nflags on seqlock retry. - Btrfs: does not check nodes for extent items. - \nBtrfs: fix a possible deadlock between scrub and transaction committing. - \nBtrfs: fix corruption after write/fsync failure + fsync + log recovery \n(bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated \nchecksums (bnc#891619). - Btrfs: fix double free in \nfind_lock_delalloc_range. - Btrfs: fix possible memory leak in \nbtrfs_create_tree(). - Btrfs: fix use of uninit \u0027ret\u0027 in \nend_extent_writepage(). - Btrfs: free delayed node outside of \nroot-\u003einode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to \nanyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make \ndevice scan less noisy. - Btrfs: make sure there are not any read requests \nbefore stopping workers. - Btrfs: more efficient io tree navigation on \nwait_extent_bit. - Btrfs: output warning instead of error when loading free \nspace cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - \nBtrfs: return EPERM when deleting a default subvolume (bnc#869934). - \nBtrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). \n- Btrfs: use right type to get real comparison. - Btrfs: wake up \n@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread \nupon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). \n- CacheFiles: Does not try to dump the index key if the cookie has been \ncleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to \nthe allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages \n(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - \nCacheFiles: Make some debugging statements conditional (bnc#880344). - \nDrivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: \nvmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - \nFS-Cache: Add transition to handle invalidate immediately after lookup \n(bnc#880344). - FS-Cache: Check that there are no read ops when cookie \nrelinquished (bnc#880344). - FS-Cache: Clear remaining page count on \nretrieval cancellation (bnc#880344). - FS-Cache: Convert the object event \nID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page \nrelease if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use \nspin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op \nsubmission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: \nFix __wait_on_atomic_t() to call the action func if the counter != 0 \n(bnc#880344). - FS-Cache: Fix object state machine to have separate work \nand wait states (bnc#880344). - FS-Cache: Fix operation state management \nand accounting (bnc#880344). - FS-Cache: Fix signal handling during waits \n(bnc#880344). - FS-Cache: Initialise the object event mask with the \ncalculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error \nreports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment \nwait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of \nin-progress operation (bnc#880344). - FS-Cache: One of the write operation \npaths doeses not set the object state (bnc#880344). - FS-Cache: Provide \nproper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for \nfscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval \nremaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: \nUninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on \nobject state (bnc#880344). - HID: usbhid: add always-poll quirk \n(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen \n(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - \nIgnore \u0027flags\u0027 change to event_constraint (bnc#876114). - Ignore \ndata_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more \noperations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper \nfunction nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read \ndelegation stateids in setattr (bnc#888968). - NFS: Does not use a \ndelegation to open a file when returning that delegation (bnc#888968, \nbnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support \nin line with code going upstream - NFS: Use FS-Cache invalidation \n(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - \nNFS: avoid mountpoint being displayed as \u0027 (deleted)\u0027 in /proc/mounts \n(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache \n(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to \nfinish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate \nparent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support \nbut pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in \nnfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to \nhandle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to \nunderstand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations \nfor 30 seconds after recalling them (bnc#880370). - NFSv4 set open access \noperation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, \nbnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data \n(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - \nNFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: \nClean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return \nvalue of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename \nnfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call \nif a stateid change causes an error (bnc#888968). - NFSv4: Simplify the \nstruct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same \nfor replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current \nshould return \u0027true\u0027 for an invalid stateid (bnc#888968). - One more fix \nfor kABI breakage. - PCI: Lock down BAR access when module security is \nenabled (bnc#884333). - PCI: enable MPS \u0027performance\u0027 setting to properly \nhandle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit \nfunction (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store \nmemory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in \nradix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of \nPFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old \nmemory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft \nLockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and \n/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing \n\u0027state\u0027 field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: \nhandle LPM errors during device suspend correctly (bnc#849123). - Update \nkabi files to reflect fscache change (bnc#880344) - Update x86_64 config \nfiles: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete \ntruncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] \nib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: \nIgnore acpi_rsdp kernel parameter when module loading is restricted \n(bnc#884333). - af_iucv: correct cleanup if listen backlog is full \n(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when \nmodule loading is restricted (bnc#884333). - autofs4: allow RCU-walk to \nwalk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during \nrcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in \nautofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out \nof autofs4_expire_indirect (bnc#866130). - autofs4: make \n\u0027autofs4_can_expire\u0027 idempotent (bnc#866130). - autofs4: remove a redundant \nassignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - \nbe2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - \nblock: add cond_resched() to potentially long running ioctl discard loop \n(bnc#884725). - block: fix race between request completion and timeout \nhandling (bnc#881051). - cdc-ether: clean packet filter upon probe \n(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - \ncrypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have \nthem, but some are FIPS certified, with some kernel support. - crypto: fips \n- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: \ntestmgr - allow aesni-intel and ghash_clmulni-intel in fips mode \n(bnc#889451). - dasd: validate request size before building CCW/TCW \n(bnc#891087, LTC#114068). - dm mpath: fix race condition between \nmultipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on \ndeleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected \ncorrectly (bnc#895983). - drm/ast: Actually load DP501 firmware when \nrequired (bnc#895608 bnc#871134). - drm/ast: Add missing entry to \ndclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide \nscreen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) \n(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - \ndrm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - \ndrm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - \ndrm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - \ndrm/i915: create functions for the \u0027unclaimed register\u0027 checks \n(bnc#869055). - drm/i915: use FPGA_DBG for the \u0027unclaimed register\u0027 checks \n(bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory \n(bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - \nfs/fscache: remove spin_lock() from the condition in while() (bnc#880344). \n- hibernate: Disable in a signed modules environment (bnc#884333). - \nhugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init \nsequence during error recovery (bnc#885382). - ibmvscsi: Add memory \nbarriers for send / receive (bnc#885382). - inet: add a redirect generation \nid in inetpeer (bnc#860593). - inetpeer: initialize -\u003eredirect_genid in \ninet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() \n(bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base \n(bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: \nfix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - \nkernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). \n- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - \nkexec: Disable at runtime if the kernel enforces module loading \nrestrictions (bnc#884333). - md/raid6: avoid data corruption during \nrecovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of \nanonymous pages (memory reclaim fix). - memcg: do not expose uninitialized \nmem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE \ncheck in vma_has_reserves() - mm, hugetlb: change variable name \nreservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE \nalloc page cache - mm, hugetlb: defer freeing pages when gathering surplus \npages - mm, hugetlb: do not use a page in page cache for cow optimization - \nmm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, \nhugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting \nhandling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: \nimprove, cleanup resv_map parameters - mm, hugetlb: move up the code which \ncheck availability of free huge page - mm, hugetlb: protect reserved pages \nwhen soft offlining a hugepage - mm, hugetlb: remove \ndecrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty \ncheck in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, \nhugetlb: remove useless check about mapping type - mm, hugetlb: return a \nreserved page to a reserved pool if failed - mm, hugetlb: trivial \ncommenting fix - mm, hugetlb: unify region structure handling - mm, \nhugetlb: unify region structure handling kabi - mm, hugetlb: use long vars \ninstead of int in region_count() (Hugetlb Fault Scalability). - mm, \nhugetlb: use vma_resv_map() map types - mm, oom: fix badness score \nunderflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to \noom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: \ndo not allow thp faults to avoid cpuset restrictions (bnc#888849). - \nnet/mlx4_core: Load higher level modules according to ports type \n(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports \nIBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and \nRX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non \n10G link speed (bnc#888058). - net: fix checksumming features handling in \noutput path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets \n(bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy \nparallel reclaim fix (bnc#895680). - perf/core: Add weighted samples \n(bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - \nperf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: \nAdd generic memory sampling interface (bnc#876114). - qla2xxx: Avoid \nescalating the SCSI error handler if the command is not found in firmware \n(bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost \nduring fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware \nhung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue \nabort command for outstanding commands during cleanup when only firmware is \nalive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to \ncomplete during SCSI error handling (bnc#859840). - qla2xxx: Set host \ncan_queue value based on available resources (bnc#859840). - restore \nsmp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy \nIOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the \ntheoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: \nEnable integrated ASCII console per default (bnc#885262, LTC#112035). - \nscsi_dh: use missing accessor \u0027scsi_device_from_queue\u0027 (bnc#889614). - \nscsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - \nscsiback: correct grant page unmapping. - scsiback: fix retry handling in \n__report_luns(). - scsiback: free resources after error. - sunrpc/auth: \nallow lockless (rcu) lookup of credential cache (bnc#866130). - \nsupported.conf: remove external from drivers/net/veth (bnc#889727) - \nsupported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt \nselected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram \ncommand timeout value to 50ms (bnc#855657). - tg3: Override clock, link \naware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC \nclock to the fastest speed during boot code load (bnc#855657). - usb: Does \nnot enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does \nnot log on consecutive debounce failures of the same port (bnc#888105). - \nusbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when \nmodule loading is restricted (bnc#884333). - vscsi: support larger transfer \nsizes (bnc#774818). - writeback: Do not sync data dirtied after sync start \n(bnc#833820). - x86 thermal: Delete power-limit-notification console \nmessages (bnc#882317). - x86 thermal: Disable power limit notification \ninterrupt by default (bnc#882317). - x86 thermal: Re-enable power limit \nnotification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix \nstack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - \nx86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add \nkdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity \nto UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - \nx86/UV: Update UV support for external NMI signals (bnc#888847). - \nx86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number \nof available vectors before CPU down (bnc#887418). - x86: Lock down IO port \naccess when module security is enabled (bnc#884333). - x86: Restrict MSR \naccess when module loading is restricted (bnc#884333).\n\nSecurity Issues:\n\n    * CVE-2013-1979\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\u003e\n    * CVE-2014-1739\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\u003e\n    * CVE-2014-2706\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\u003e\n    * CVE-2014-4027\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\u003e\n    * CVE-2014-4171\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\u003e\n    * CVE-2014-4508\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\u003e\n    * CVE-2014-4667\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\u003e\n    * CVE-2014-4943\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\u003e\n    * CVE-2014-5077\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\u003e\n    * CVE-2014-5471\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\u003e\n    * CVE-2014-5472\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\u003e\n    * CVE-2014-3153\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\u003e\n    * CVE-2014-6410\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\u003e\n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "slertesp3-kernel",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0736-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2015:0736-1",
        "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150736-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2015:0736-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 599263",
        "url": "https://bugzilla.suse.com/599263"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 708296",
        "url": "https://bugzilla.suse.com/708296"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 733022",
        "url": "https://bugzilla.suse.com/733022"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 745640",
        "url": "https://bugzilla.suse.com/745640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 754690",
        "url": "https://bugzilla.suse.com/754690"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 755743",
        "url": "https://bugzilla.suse.com/755743"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 760407",
        "url": "https://bugzilla.suse.com/760407"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 763463",
        "url": "https://bugzilla.suse.com/763463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 763968",
        "url": "https://bugzilla.suse.com/763968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 765523",
        "url": "https://bugzilla.suse.com/765523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 767610",
        "url": "https://bugzilla.suse.com/767610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 769035",
        "url": "https://bugzilla.suse.com/769035"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 769644",
        "url": "https://bugzilla.suse.com/769644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 770541",
        "url": "https://bugzilla.suse.com/770541"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 771619",
        "url": "https://bugzilla.suse.com/771619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 773006",
        "url": "https://bugzilla.suse.com/773006"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 773255",
        "url": "https://bugzilla.suse.com/773255"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 773837",
        "url": "https://bugzilla.suse.com/773837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 774818",
        "url": "https://bugzilla.suse.com/774818"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 779488",
        "url": "https://bugzilla.suse.com/779488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 783475",
        "url": "https://bugzilla.suse.com/783475"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 785901",
        "url": "https://bugzilla.suse.com/785901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 786450",
        "url": "https://bugzilla.suse.com/786450"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 787843",
        "url": "https://bugzilla.suse.com/787843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 789010",
        "url": "https://bugzilla.suse.com/789010"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 789359",
        "url": "https://bugzilla.suse.com/789359"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 792271",
        "url": "https://bugzilla.suse.com/792271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 792991",
        "url": "https://bugzilla.suse.com/792991"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 793727",
        "url": "https://bugzilla.suse.com/793727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 794824",
        "url": "https://bugzilla.suse.com/794824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 797090",
        "url": "https://bugzilla.suse.com/797090"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 797526",
        "url": "https://bugzilla.suse.com/797526"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 797727",
        "url": "https://bugzilla.suse.com/797727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 797909",
        "url": "https://bugzilla.suse.com/797909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 798050",
        "url": "https://bugzilla.suse.com/798050"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 800255",
        "url": "https://bugzilla.suse.com/800255"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 800875",
        "url": "https://bugzilla.suse.com/800875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 800907",
        "url": "https://bugzilla.suse.com/800907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 801341",
        "url": "https://bugzilla.suse.com/801341"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 801427",
        "url": "https://bugzilla.suse.com/801427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 803174",
        "url": "https://bugzilla.suse.com/803174"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 803320",
        "url": "https://bugzilla.suse.com/803320"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 804482",
        "url": "https://bugzilla.suse.com/804482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 804609",
        "url": "https://bugzilla.suse.com/804609"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 804950",
        "url": "https://bugzilla.suse.com/804950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 805114",
        "url": "https://bugzilla.suse.com/805114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 805371",
        "url": "https://bugzilla.suse.com/805371"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 805740",
        "url": "https://bugzilla.suse.com/805740"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 805804",
        "url": "https://bugzilla.suse.com/805804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 805945",
        "url": "https://bugzilla.suse.com/805945"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 806396",
        "url": "https://bugzilla.suse.com/806396"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 806976",
        "url": "https://bugzilla.suse.com/806976"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 806988",
        "url": "https://bugzilla.suse.com/806988"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 806990",
        "url": "https://bugzilla.suse.com/806990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 807471",
        "url": "https://bugzilla.suse.com/807471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 807502",
        "url": "https://bugzilla.suse.com/807502"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 808015",
        "url": "https://bugzilla.suse.com/808015"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 808079",
        "url": "https://bugzilla.suse.com/808079"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 808136",
        "url": "https://bugzilla.suse.com/808136"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 808647",
        "url": "https://bugzilla.suse.com/808647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 808837",
        "url": "https://bugzilla.suse.com/808837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 808855",
        "url": "https://bugzilla.suse.com/808855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 808940",
        "url": "https://bugzilla.suse.com/808940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 809122",
        "url": "https://bugzilla.suse.com/809122"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 809130",
        "url": "https://bugzilla.suse.com/809130"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 809220",
        "url": "https://bugzilla.suse.com/809220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 809463",
        "url": "https://bugzilla.suse.com/809463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 809617",
        "url": "https://bugzilla.suse.com/809617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 809895",
        "url": "https://bugzilla.suse.com/809895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 809975",
        "url": "https://bugzilla.suse.com/809975"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 810098",
        "url": "https://bugzilla.suse.com/810098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 810210",
        "url": "https://bugzilla.suse.com/810210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 810323",
        "url": "https://bugzilla.suse.com/810323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 810722",
        "url": "https://bugzilla.suse.com/810722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 812274",
        "url": "https://bugzilla.suse.com/812274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 812281",
        "url": "https://bugzilla.suse.com/812281"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 812332",
        "url": "https://bugzilla.suse.com/812332"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 812526",
        "url": "https://bugzilla.suse.com/812526"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 812974",
        "url": "https://bugzilla.suse.com/812974"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 813245",
        "url": "https://bugzilla.suse.com/813245"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 813604",
        "url": "https://bugzilla.suse.com/813604"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 813733",
        "url": "https://bugzilla.suse.com/813733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 813922",
        "url": "https://bugzilla.suse.com/813922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 814336",
        "url": "https://bugzilla.suse.com/814336"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 815256",
        "url": "https://bugzilla.suse.com/815256"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 815320",
        "url": "https://bugzilla.suse.com/815320"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 815356",
        "url": "https://bugzilla.suse.com/815356"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816043",
        "url": "https://bugzilla.suse.com/816043"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816065",
        "url": "https://bugzilla.suse.com/816065"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816099",
        "url": "https://bugzilla.suse.com/816099"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816403",
        "url": "https://bugzilla.suse.com/816403"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816451",
        "url": "https://bugzilla.suse.com/816451"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816708",
        "url": "https://bugzilla.suse.com/816708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816892",
        "url": "https://bugzilla.suse.com/816892"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816925",
        "url": "https://bugzilla.suse.com/816925"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816971",
        "url": "https://bugzilla.suse.com/816971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 817035",
        "url": "https://bugzilla.suse.com/817035"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 817339",
        "url": "https://bugzilla.suse.com/817339"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 817377",
        "url": "https://bugzilla.suse.com/817377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 818047",
        "url": "https://bugzilla.suse.com/818047"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 818053",
        "url": "https://bugzilla.suse.com/818053"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 818064",
        "url": "https://bugzilla.suse.com/818064"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 818154",
        "url": "https://bugzilla.suse.com/818154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 818371",
        "url": "https://bugzilla.suse.com/818371"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 818465",
        "url": "https://bugzilla.suse.com/818465"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 818497",
        "url": "https://bugzilla.suse.com/818497"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 818545",
        "url": "https://bugzilla.suse.com/818545"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819018",
        "url": "https://bugzilla.suse.com/819018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819195",
        "url": "https://bugzilla.suse.com/819195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819295",
        "url": "https://bugzilla.suse.com/819295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819363",
        "url": "https://bugzilla.suse.com/819363"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819519",
        "url": "https://bugzilla.suse.com/819519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819523",
        "url": "https://bugzilla.suse.com/819523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819610",
        "url": "https://bugzilla.suse.com/819610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819655",
        "url": "https://bugzilla.suse.com/819655"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819789",
        "url": "https://bugzilla.suse.com/819789"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 819979",
        "url": "https://bugzilla.suse.com/819979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820102",
        "url": "https://bugzilla.suse.com/820102"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820172",
        "url": "https://bugzilla.suse.com/820172"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820183",
        "url": "https://bugzilla.suse.com/820183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820338",
        "url": "https://bugzilla.suse.com/820338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820434",
        "url": "https://bugzilla.suse.com/820434"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820569",
        "url": "https://bugzilla.suse.com/820569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820738",
        "url": "https://bugzilla.suse.com/820738"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820848",
        "url": "https://bugzilla.suse.com/820848"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820948",
        "url": "https://bugzilla.suse.com/820948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820982",
        "url": "https://bugzilla.suse.com/820982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821052",
        "url": "https://bugzilla.suse.com/821052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821070",
        "url": "https://bugzilla.suse.com/821070"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821235",
        "url": "https://bugzilla.suse.com/821235"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821259",
        "url": "https://bugzilla.suse.com/821259"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821465",
        "url": "https://bugzilla.suse.com/821465"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821560",
        "url": "https://bugzilla.suse.com/821560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821619",
        "url": "https://bugzilla.suse.com/821619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821799",
        "url": "https://bugzilla.suse.com/821799"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821802",
        "url": "https://bugzilla.suse.com/821802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821859",
        "url": "https://bugzilla.suse.com/821859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821930",
        "url": "https://bugzilla.suse.com/821930"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821948",
        "url": "https://bugzilla.suse.com/821948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 821980",
        "url": "https://bugzilla.suse.com/821980"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822052",
        "url": "https://bugzilla.suse.com/822052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822066",
        "url": "https://bugzilla.suse.com/822066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822077",
        "url": "https://bugzilla.suse.com/822077"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822080",
        "url": "https://bugzilla.suse.com/822080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822164",
        "url": "https://bugzilla.suse.com/822164"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822225",
        "url": "https://bugzilla.suse.com/822225"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822340",
        "url": "https://bugzilla.suse.com/822340"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822431",
        "url": "https://bugzilla.suse.com/822431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822433",
        "url": "https://bugzilla.suse.com/822433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822575",
        "url": "https://bugzilla.suse.com/822575"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822579",
        "url": "https://bugzilla.suse.com/822579"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822722",
        "url": "https://bugzilla.suse.com/822722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822825",
        "url": "https://bugzilla.suse.com/822825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822878",
        "url": "https://bugzilla.suse.com/822878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 822942",
        "url": "https://bugzilla.suse.com/822942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 823082",
        "url": "https://bugzilla.suse.com/823082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 823191",
        "url": "https://bugzilla.suse.com/823191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 823223",
        "url": "https://bugzilla.suse.com/823223"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 823342",
        "url": "https://bugzilla.suse.com/823342"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 823386",
        "url": "https://bugzilla.suse.com/823386"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 823517",
        "url": "https://bugzilla.suse.com/823517"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 823597",
        "url": "https://bugzilla.suse.com/823597"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 823618",
        "url": "https://bugzilla.suse.com/823618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 823795",
        "url": "https://bugzilla.suse.com/823795"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 824159",
        "url": "https://bugzilla.suse.com/824159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 824256",
        "url": "https://bugzilla.suse.com/824256"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 824295",
        "url": "https://bugzilla.suse.com/824295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 824568",
        "url": "https://bugzilla.suse.com/824568"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 824915",
        "url": "https://bugzilla.suse.com/824915"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825006",
        "url": "https://bugzilla.suse.com/825006"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825037",
        "url": "https://bugzilla.suse.com/825037"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825048",
        "url": "https://bugzilla.suse.com/825048"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825142",
        "url": "https://bugzilla.suse.com/825142"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825227",
        "url": "https://bugzilla.suse.com/825227"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825291",
        "url": "https://bugzilla.suse.com/825291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825591",
        "url": "https://bugzilla.suse.com/825591"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825657",
        "url": "https://bugzilla.suse.com/825657"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825696",
        "url": "https://bugzilla.suse.com/825696"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825887",
        "url": "https://bugzilla.suse.com/825887"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 825896",
        "url": "https://bugzilla.suse.com/825896"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 826102",
        "url": "https://bugzilla.suse.com/826102"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 826186",
        "url": "https://bugzilla.suse.com/826186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 826350",
        "url": "https://bugzilla.suse.com/826350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 826486",
        "url": "https://bugzilla.suse.com/826486"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 826602",
        "url": "https://bugzilla.suse.com/826602"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 826756",
        "url": "https://bugzilla.suse.com/826756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 826960",
        "url": "https://bugzilla.suse.com/826960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 826978",
        "url": "https://bugzilla.suse.com/826978"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827246",
        "url": "https://bugzilla.suse.com/827246"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827271",
        "url": "https://bugzilla.suse.com/827271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827372",
        "url": "https://bugzilla.suse.com/827372"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827376",
        "url": "https://bugzilla.suse.com/827376"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827378",
        "url": "https://bugzilla.suse.com/827378"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827416",
        "url": "https://bugzilla.suse.com/827416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827527",
        "url": "https://bugzilla.suse.com/827527"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827670",
        "url": "https://bugzilla.suse.com/827670"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827749",
        "url": "https://bugzilla.suse.com/827749"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827750",
        "url": "https://bugzilla.suse.com/827750"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827767",
        "url": "https://bugzilla.suse.com/827767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827930",
        "url": "https://bugzilla.suse.com/827930"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 827966",
        "url": "https://bugzilla.suse.com/827966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828087",
        "url": "https://bugzilla.suse.com/828087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828119",
        "url": "https://bugzilla.suse.com/828119"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828192",
        "url": "https://bugzilla.suse.com/828192"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828236",
        "url": "https://bugzilla.suse.com/828236"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828265",
        "url": "https://bugzilla.suse.com/828265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828574",
        "url": "https://bugzilla.suse.com/828574"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828714",
        "url": "https://bugzilla.suse.com/828714"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828886",
        "url": "https://bugzilla.suse.com/828886"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828894",
        "url": "https://bugzilla.suse.com/828894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 828914",
        "url": "https://bugzilla.suse.com/828914"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 829001",
        "url": "https://bugzilla.suse.com/829001"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 829082",
        "url": "https://bugzilla.suse.com/829082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 829110",
        "url": "https://bugzilla.suse.com/829110"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 829357",
        "url": "https://bugzilla.suse.com/829357"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 829539",
        "url": "https://bugzilla.suse.com/829539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 829622",
        "url": "https://bugzilla.suse.com/829622"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 829682",
        "url": "https://bugzilla.suse.com/829682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 830346",
        "url": "https://bugzilla.suse.com/830346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 830478",
        "url": "https://bugzilla.suse.com/830478"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 830766",
        "url": "https://bugzilla.suse.com/830766"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 830822",
        "url": "https://bugzilla.suse.com/830822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 830901",
        "url": "https://bugzilla.suse.com/830901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 830985",
        "url": "https://bugzilla.suse.com/830985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831029",
        "url": "https://bugzilla.suse.com/831029"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831055",
        "url": "https://bugzilla.suse.com/831055"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831058",
        "url": "https://bugzilla.suse.com/831058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831103",
        "url": "https://bugzilla.suse.com/831103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831143",
        "url": "https://bugzilla.suse.com/831143"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831380",
        "url": "https://bugzilla.suse.com/831380"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831410",
        "url": "https://bugzilla.suse.com/831410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831422",
        "url": "https://bugzilla.suse.com/831422"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831424",
        "url": "https://bugzilla.suse.com/831424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831438",
        "url": "https://bugzilla.suse.com/831438"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831623",
        "url": "https://bugzilla.suse.com/831623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831949",
        "url": "https://bugzilla.suse.com/831949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 832292",
        "url": "https://bugzilla.suse.com/832292"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 832309",
        "url": "https://bugzilla.suse.com/832309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 832318",
        "url": "https://bugzilla.suse.com/832318"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 832710",
        "url": "https://bugzilla.suse.com/832710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833073",
        "url": "https://bugzilla.suse.com/833073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833097",
        "url": "https://bugzilla.suse.com/833097"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833148",
        "url": "https://bugzilla.suse.com/833148"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833151",
        "url": "https://bugzilla.suse.com/833151"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833321",
        "url": "https://bugzilla.suse.com/833321"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833588",
        "url": "https://bugzilla.suse.com/833588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833635",
        "url": "https://bugzilla.suse.com/833635"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833820",
        "url": "https://bugzilla.suse.com/833820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833858",
        "url": "https://bugzilla.suse.com/833858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 833968",
        "url": "https://bugzilla.suse.com/833968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 834116",
        "url": "https://bugzilla.suse.com/834116"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 834204",
        "url": "https://bugzilla.suse.com/834204"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 834473",
        "url": "https://bugzilla.suse.com/834473"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 834600",
        "url": "https://bugzilla.suse.com/834600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 834647",
        "url": "https://bugzilla.suse.com/834647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 834708",
        "url": "https://bugzilla.suse.com/834708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 834742",
        "url": "https://bugzilla.suse.com/834742"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 834808",
        "url": "https://bugzilla.suse.com/834808"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 834905",
        "url": "https://bugzilla.suse.com/834905"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 835074",
        "url": "https://bugzilla.suse.com/835074"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 835094",
        "url": "https://bugzilla.suse.com/835094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 835175",
        "url": "https://bugzilla.suse.com/835175"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 835186",
        "url": "https://bugzilla.suse.com/835186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 835189",
        "url": "https://bugzilla.suse.com/835189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 835684",
        "url": "https://bugzilla.suse.com/835684"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 835839",
        "url": "https://bugzilla.suse.com/835839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 835930",
        "url": "https://bugzilla.suse.com/835930"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 836218",
        "url": "https://bugzilla.suse.com/836218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 836347",
        "url": "https://bugzilla.suse.com/836347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 836718",
        "url": "https://bugzilla.suse.com/836718"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 836801",
        "url": "https://bugzilla.suse.com/836801"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 837206",
        "url": "https://bugzilla.suse.com/837206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 837372",
        "url": "https://bugzilla.suse.com/837372"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 837563",
        "url": "https://bugzilla.suse.com/837563"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 837596",
        "url": "https://bugzilla.suse.com/837596"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 837739",
        "url": "https://bugzilla.suse.com/837739"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 837741",
        "url": "https://bugzilla.suse.com/837741"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 837803",
        "url": "https://bugzilla.suse.com/837803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 838346",
        "url": "https://bugzilla.suse.com/838346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 838448",
        "url": "https://bugzilla.suse.com/838448"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 838623",
        "url": "https://bugzilla.suse.com/838623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 839407",
        "url": "https://bugzilla.suse.com/839407"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 839973",
        "url": "https://bugzilla.suse.com/839973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 840116",
        "url": "https://bugzilla.suse.com/840116"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 840226",
        "url": "https://bugzilla.suse.com/840226"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 840524",
        "url": "https://bugzilla.suse.com/840524"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 840830",
        "url": "https://bugzilla.suse.com/840830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 841050",
        "url": "https://bugzilla.suse.com/841050"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 841094",
        "url": "https://bugzilla.suse.com/841094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 841402",
        "url": "https://bugzilla.suse.com/841402"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 841445",
        "url": "https://bugzilla.suse.com/841445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 841498",
        "url": "https://bugzilla.suse.com/841498"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 841654",
        "url": "https://bugzilla.suse.com/841654"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 841656",
        "url": "https://bugzilla.suse.com/841656"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 842057",
        "url": "https://bugzilla.suse.com/842057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 842063",
        "url": "https://bugzilla.suse.com/842063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 842239",
        "url": "https://bugzilla.suse.com/842239"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 842604",
        "url": "https://bugzilla.suse.com/842604"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 842820",
        "url": "https://bugzilla.suse.com/842820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843185",
        "url": "https://bugzilla.suse.com/843185"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843419",
        "url": "https://bugzilla.suse.com/843419"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843429",
        "url": "https://bugzilla.suse.com/843429"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843445",
        "url": "https://bugzilla.suse.com/843445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843642",
        "url": "https://bugzilla.suse.com/843642"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843645",
        "url": "https://bugzilla.suse.com/843645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843654",
        "url": "https://bugzilla.suse.com/843654"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843732",
        "url": "https://bugzilla.suse.com/843732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843753",
        "url": "https://bugzilla.suse.com/843753"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 843950",
        "url": "https://bugzilla.suse.com/843950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 844513",
        "url": "https://bugzilla.suse.com/844513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 845352",
        "url": "https://bugzilla.suse.com/845352"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 845378",
        "url": "https://bugzilla.suse.com/845378"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 845621",
        "url": "https://bugzilla.suse.com/845621"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 845729",
        "url": "https://bugzilla.suse.com/845729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 846036",
        "url": "https://bugzilla.suse.com/846036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 846298",
        "url": "https://bugzilla.suse.com/846298"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 846404",
        "url": "https://bugzilla.suse.com/846404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 846654",
        "url": "https://bugzilla.suse.com/846654"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 846656",
        "url": "https://bugzilla.suse.com/846656"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 846690",
        "url": "https://bugzilla.suse.com/846690"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 846790",
        "url": "https://bugzilla.suse.com/846790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 846984",
        "url": "https://bugzilla.suse.com/846984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 846989",
        "url": "https://bugzilla.suse.com/846989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 847261",
        "url": "https://bugzilla.suse.com/847261"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 847319",
        "url": "https://bugzilla.suse.com/847319"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 847652",
        "url": "https://bugzilla.suse.com/847652"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 847660",
        "url": "https://bugzilla.suse.com/847660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 847672",
        "url": "https://bugzilla.suse.com/847672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 847842",
        "url": "https://bugzilla.suse.com/847842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 848055",
        "url": "https://bugzilla.suse.com/848055"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 848317",
        "url": "https://bugzilla.suse.com/848317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 848321",
        "url": "https://bugzilla.suse.com/848321"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 848335",
        "url": "https://bugzilla.suse.com/848335"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 848336",
        "url": "https://bugzilla.suse.com/848336"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 848544",
        "url": "https://bugzilla.suse.com/848544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 848864",
        "url": "https://bugzilla.suse.com/848864"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849021",
        "url": "https://bugzilla.suse.com/849021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849029",
        "url": "https://bugzilla.suse.com/849029"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849034",
        "url": "https://bugzilla.suse.com/849034"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849123",
        "url": "https://bugzilla.suse.com/849123"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849256",
        "url": "https://bugzilla.suse.com/849256"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849362",
        "url": "https://bugzilla.suse.com/849362"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849364",
        "url": "https://bugzilla.suse.com/849364"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849404",
        "url": "https://bugzilla.suse.com/849404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849675",
        "url": "https://bugzilla.suse.com/849675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849809",
        "url": "https://bugzilla.suse.com/849809"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849855",
        "url": "https://bugzilla.suse.com/849855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 849950",
        "url": "https://bugzilla.suse.com/849950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 850072",
        "url": "https://bugzilla.suse.com/850072"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 850103",
        "url": "https://bugzilla.suse.com/850103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 850324",
        "url": "https://bugzilla.suse.com/850324"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 850493",
        "url": "https://bugzilla.suse.com/850493"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 850640",
        "url": "https://bugzilla.suse.com/850640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 850915",
        "url": "https://bugzilla.suse.com/850915"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 851066",
        "url": "https://bugzilla.suse.com/851066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 851101",
        "url": "https://bugzilla.suse.com/851101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 851290",
        "url": "https://bugzilla.suse.com/851290"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 851314",
        "url": "https://bugzilla.suse.com/851314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 851426",
        "url": "https://bugzilla.suse.com/851426"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 851603",
        "url": "https://bugzilla.suse.com/851603"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 851879",
        "url": "https://bugzilla.suse.com/851879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 852153",
        "url": "https://bugzilla.suse.com/852153"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 852373",
        "url": "https://bugzilla.suse.com/852373"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 852488",
        "url": "https://bugzilla.suse.com/852488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 852553",
        "url": "https://bugzilla.suse.com/852553"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 852558",
        "url": "https://bugzilla.suse.com/852558"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 852559",
        "url": "https://bugzilla.suse.com/852559"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 852652",
        "url": "https://bugzilla.suse.com/852652"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 852761",
        "url": "https://bugzilla.suse.com/852761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 852967",
        "url": "https://bugzilla.suse.com/852967"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853040",
        "url": "https://bugzilla.suse.com/853040"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853050",
        "url": "https://bugzilla.suse.com/853050"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853051",
        "url": "https://bugzilla.suse.com/853051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853052",
        "url": "https://bugzilla.suse.com/853052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853053",
        "url": "https://bugzilla.suse.com/853053"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853162",
        "url": "https://bugzilla.suse.com/853162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853166",
        "url": "https://bugzilla.suse.com/853166"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853428",
        "url": "https://bugzilla.suse.com/853428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853455",
        "url": "https://bugzilla.suse.com/853455"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 853465",
        "url": "https://bugzilla.suse.com/853465"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 854025",
        "url": "https://bugzilla.suse.com/854025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 854445",
        "url": "https://bugzilla.suse.com/854445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 854516",
        "url": "https://bugzilla.suse.com/854516"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 854546",
        "url": "https://bugzilla.suse.com/854546"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 854634",
        "url": "https://bugzilla.suse.com/854634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 854722",
        "url": "https://bugzilla.suse.com/854722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 855126",
        "url": "https://bugzilla.suse.com/855126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 855657",
        "url": "https://bugzilla.suse.com/855657"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 855825",
        "url": "https://bugzilla.suse.com/855825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 855885",
        "url": "https://bugzilla.suse.com/855885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 856307",
        "url": "https://bugzilla.suse.com/856307"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 856481",
        "url": "https://bugzilla.suse.com/856481"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 856760",
        "url": "https://bugzilla.suse.com/856760"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 856848",
        "url": "https://bugzilla.suse.com/856848"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 857358",
        "url": "https://bugzilla.suse.com/857358"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 857643",
        "url": "https://bugzilla.suse.com/857643"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 857919",
        "url": "https://bugzilla.suse.com/857919"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 857926",
        "url": "https://bugzilla.suse.com/857926"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 858534",
        "url": "https://bugzilla.suse.com/858534"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 858604",
        "url": "https://bugzilla.suse.com/858604"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 858831",
        "url": "https://bugzilla.suse.com/858831"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 858869",
        "url": "https://bugzilla.suse.com/858869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 858870",
        "url": "https://bugzilla.suse.com/858870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 858872",
        "url": "https://bugzilla.suse.com/858872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 859225",
        "url": "https://bugzilla.suse.com/859225"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 859342",
        "url": "https://bugzilla.suse.com/859342"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 859840",
        "url": "https://bugzilla.suse.com/859840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 860441",
        "url": "https://bugzilla.suse.com/860441"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 860593",
        "url": "https://bugzilla.suse.com/860593"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 861093",
        "url": "https://bugzilla.suse.com/861093"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 861636",
        "url": "https://bugzilla.suse.com/861636"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 861980",
        "url": "https://bugzilla.suse.com/861980"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 862429",
        "url": "https://bugzilla.suse.com/862429"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 862796",
        "url": "https://bugzilla.suse.com/862796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 862934",
        "url": "https://bugzilla.suse.com/862934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 862957",
        "url": "https://bugzilla.suse.com/862957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 863178",
        "url": "https://bugzilla.suse.com/863178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 863300",
        "url": "https://bugzilla.suse.com/863300"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 863335",
        "url": "https://bugzilla.suse.com/863335"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 863410",
        "url": "https://bugzilla.suse.com/863410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 863526",
        "url": "https://bugzilla.suse.com/863526"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 863586",
        "url": "https://bugzilla.suse.com/863586"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 863873",
        "url": "https://bugzilla.suse.com/863873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 864025",
        "url": "https://bugzilla.suse.com/864025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 864058",
        "url": "https://bugzilla.suse.com/864058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 864401",
        "url": "https://bugzilla.suse.com/864401"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 864404",
        "url": "https://bugzilla.suse.com/864404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 864409",
        "url": "https://bugzilla.suse.com/864409"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 864411",
        "url": "https://bugzilla.suse.com/864411"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 864464",
        "url": "https://bugzilla.suse.com/864464"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 864833",
        "url": "https://bugzilla.suse.com/864833"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 864880",
        "url": "https://bugzilla.suse.com/864880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 865310",
        "url": "https://bugzilla.suse.com/865310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 865330",
        "url": "https://bugzilla.suse.com/865330"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 865342",
        "url": "https://bugzilla.suse.com/865342"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 865419",
        "url": "https://bugzilla.suse.com/865419"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 865783",
        "url": "https://bugzilla.suse.com/865783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 865882",
        "url": "https://bugzilla.suse.com/865882"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 866081",
        "url": "https://bugzilla.suse.com/866081"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 866102",
        "url": "https://bugzilla.suse.com/866102"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 866130",
        "url": "https://bugzilla.suse.com/866130"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 866253",
        "url": "https://bugzilla.suse.com/866253"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 866428",
        "url": "https://bugzilla.suse.com/866428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 866615",
        "url": "https://bugzilla.suse.com/866615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 866800",
        "url": "https://bugzilla.suse.com/866800"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 866864",
        "url": "https://bugzilla.suse.com/866864"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 866911",
        "url": "https://bugzilla.suse.com/866911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 867362",
        "url": "https://bugzilla.suse.com/867362"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 867517",
        "url": "https://bugzilla.suse.com/867517"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 867531",
        "url": "https://bugzilla.suse.com/867531"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 867723",
        "url": "https://bugzilla.suse.com/867723"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 867953",
        "url": "https://bugzilla.suse.com/867953"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 868049",
        "url": "https://bugzilla.suse.com/868049"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 868488",
        "url": "https://bugzilla.suse.com/868488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 868528",
        "url": "https://bugzilla.suse.com/868528"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 868653",
        "url": "https://bugzilla.suse.com/868653"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 868748",
        "url": "https://bugzilla.suse.com/868748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 869033",
        "url": "https://bugzilla.suse.com/869033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 869055",
        "url": "https://bugzilla.suse.com/869055"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 869414",
        "url": "https://bugzilla.suse.com/869414"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 869563",
        "url": "https://bugzilla.suse.com/869563"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 869934",
        "url": "https://bugzilla.suse.com/869934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870161",
        "url": "https://bugzilla.suse.com/870161"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870173",
        "url": "https://bugzilla.suse.com/870173"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870335",
        "url": "https://bugzilla.suse.com/870335"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870450",
        "url": "https://bugzilla.suse.com/870450"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870496",
        "url": "https://bugzilla.suse.com/870496"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870498",
        "url": "https://bugzilla.suse.com/870498"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870576",
        "url": "https://bugzilla.suse.com/870576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870591",
        "url": "https://bugzilla.suse.com/870591"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870618",
        "url": "https://bugzilla.suse.com/870618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870801",
        "url": "https://bugzilla.suse.com/870801"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870877",
        "url": "https://bugzilla.suse.com/870877"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 870958",
        "url": "https://bugzilla.suse.com/870958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 871134",
        "url": "https://bugzilla.suse.com/871134"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 871561",
        "url": "https://bugzilla.suse.com/871561"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 871634",
        "url": "https://bugzilla.suse.com/871634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 871676",
        "url": "https://bugzilla.suse.com/871676"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 871728",
        "url": "https://bugzilla.suse.com/871728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 871797",
        "url": "https://bugzilla.suse.com/871797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 871854",
        "url": "https://bugzilla.suse.com/871854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 871861",
        "url": "https://bugzilla.suse.com/871861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 871899",
        "url": "https://bugzilla.suse.com/871899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 872188",
        "url": "https://bugzilla.suse.com/872188"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 872540",
        "url": "https://bugzilla.suse.com/872540"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 872634",
        "url": "https://bugzilla.suse.com/872634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 873061",
        "url": "https://bugzilla.suse.com/873061"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 873228",
        "url": "https://bugzilla.suse.com/873228"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 873374",
        "url": "https://bugzilla.suse.com/873374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 873463",
        "url": "https://bugzilla.suse.com/873463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 874108",
        "url": "https://bugzilla.suse.com/874108"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 874145",
        "url": "https://bugzilla.suse.com/874145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 874440",
        "url": "https://bugzilla.suse.com/874440"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 874577",
        "url": "https://bugzilla.suse.com/874577"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 875051",
        "url": "https://bugzilla.suse.com/875051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 875386",
        "url": "https://bugzilla.suse.com/875386"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 875690",
        "url": "https://bugzilla.suse.com/875690"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 875798",
        "url": "https://bugzilla.suse.com/875798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876017",
        "url": "https://bugzilla.suse.com/876017"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876055",
        "url": "https://bugzilla.suse.com/876055"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876086",
        "url": "https://bugzilla.suse.com/876086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876102",
        "url": "https://bugzilla.suse.com/876102"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876114",
        "url": "https://bugzilla.suse.com/876114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876176",
        "url": "https://bugzilla.suse.com/876176"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876463",
        "url": "https://bugzilla.suse.com/876463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876590",
        "url": "https://bugzilla.suse.com/876590"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876594",
        "url": "https://bugzilla.suse.com/876594"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 876633",
        "url": "https://bugzilla.suse.com/876633"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 877013",
        "url": "https://bugzilla.suse.com/877013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 877257",
        "url": "https://bugzilla.suse.com/877257"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 877456",
        "url": "https://bugzilla.suse.com/877456"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 877497",
        "url": "https://bugzilla.suse.com/877497"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 877593",
        "url": "https://bugzilla.suse.com/877593"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 877775",
        "url": "https://bugzilla.suse.com/877775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 878115",
        "url": "https://bugzilla.suse.com/878115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 878123",
        "url": "https://bugzilla.suse.com/878123"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 878274",
        "url": "https://bugzilla.suse.com/878274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 878407",
        "url": "https://bugzilla.suse.com/878407"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 878509",
        "url": "https://bugzilla.suse.com/878509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 879304",
        "url": "https://bugzilla.suse.com/879304"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 879921",
        "url": "https://bugzilla.suse.com/879921"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 879957",
        "url": "https://bugzilla.suse.com/879957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 880007",
        "url": "https://bugzilla.suse.com/880007"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 880344",
        "url": "https://bugzilla.suse.com/880344"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 880357",
        "url": "https://bugzilla.suse.com/880357"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 880370",
        "url": "https://bugzilla.suse.com/880370"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 880437",
        "url": "https://bugzilla.suse.com/880437"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 880484",
        "url": "https://bugzilla.suse.com/880484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 880892",
        "url": "https://bugzilla.suse.com/880892"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 881051",
        "url": "https://bugzilla.suse.com/881051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 881571",
        "url": "https://bugzilla.suse.com/881571"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 881759",
        "url": "https://bugzilla.suse.com/881759"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 881761",
        "url": "https://bugzilla.suse.com/881761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 881939",
        "url": "https://bugzilla.suse.com/881939"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 882317",
        "url": "https://bugzilla.suse.com/882317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 882324",
        "url": "https://bugzilla.suse.com/882324"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 882470",
        "url": "https://bugzilla.suse.com/882470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 882639",
        "url": "https://bugzilla.suse.com/882639"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 882804",
        "url": "https://bugzilla.suse.com/882804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 882900",
        "url": "https://bugzilla.suse.com/882900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 883096",
        "url": "https://bugzilla.suse.com/883096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 883376",
        "url": "https://bugzilla.suse.com/883376"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 883380",
        "url": "https://bugzilla.suse.com/883380"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 883518",
        "url": "https://bugzilla.suse.com/883518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 883724",
        "url": "https://bugzilla.suse.com/883724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 883795",
        "url": "https://bugzilla.suse.com/883795"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 883948",
        "url": "https://bugzilla.suse.com/883948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 884333",
        "url": "https://bugzilla.suse.com/884333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 884582",
        "url": "https://bugzilla.suse.com/884582"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 884725",
        "url": "https://bugzilla.suse.com/884725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 884767",
        "url": "https://bugzilla.suse.com/884767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 884817",
        "url": "https://bugzilla.suse.com/884817"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 885077",
        "url": "https://bugzilla.suse.com/885077"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 885262",
        "url": "https://bugzilla.suse.com/885262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 885382",
        "url": "https://bugzilla.suse.com/885382"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 885422",
        "url": "https://bugzilla.suse.com/885422"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 885509",
        "url": "https://bugzilla.suse.com/885509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 885725",
        "url": "https://bugzilla.suse.com/885725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 886840",
        "url": "https://bugzilla.suse.com/886840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 887082",
        "url": "https://bugzilla.suse.com/887082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 887418",
        "url": "https://bugzilla.suse.com/887418"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 887503",
        "url": "https://bugzilla.suse.com/887503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 887597",
        "url": "https://bugzilla.suse.com/887597"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 887608",
        "url": "https://bugzilla.suse.com/887608"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 887645",
        "url": "https://bugzilla.suse.com/887645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 887680",
        "url": "https://bugzilla.suse.com/887680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 888058",
        "url": "https://bugzilla.suse.com/888058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 888105",
        "url": "https://bugzilla.suse.com/888105"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 888591",
        "url": "https://bugzilla.suse.com/888591"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 888607",
        "url": "https://bugzilla.suse.com/888607"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 888847",
        "url": "https://bugzilla.suse.com/888847"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 888849",
        "url": "https://bugzilla.suse.com/888849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 888968",
        "url": "https://bugzilla.suse.com/888968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889061",
        "url": "https://bugzilla.suse.com/889061"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889173",
        "url": "https://bugzilla.suse.com/889173"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889221",
        "url": "https://bugzilla.suse.com/889221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889451",
        "url": "https://bugzilla.suse.com/889451"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889614",
        "url": "https://bugzilla.suse.com/889614"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889727",
        "url": "https://bugzilla.suse.com/889727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 890297",
        "url": "https://bugzilla.suse.com/890297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 890426",
        "url": "https://bugzilla.suse.com/890426"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 890513",
        "url": "https://bugzilla.suse.com/890513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 890526",
        "url": "https://bugzilla.suse.com/890526"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891087",
        "url": "https://bugzilla.suse.com/891087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891211",
        "url": "https://bugzilla.suse.com/891211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891212",
        "url": "https://bugzilla.suse.com/891212"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891259",
        "url": "https://bugzilla.suse.com/891259"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891277",
        "url": "https://bugzilla.suse.com/891277"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891281",
        "url": "https://bugzilla.suse.com/891281"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891368",
        "url": "https://bugzilla.suse.com/891368"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891619",
        "url": "https://bugzilla.suse.com/891619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891641",
        "url": "https://bugzilla.suse.com/891641"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891746",
        "url": "https://bugzilla.suse.com/891746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 891790",
        "url": "https://bugzilla.suse.com/891790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 892200",
        "url": "https://bugzilla.suse.com/892200"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 892490",
        "url": "https://bugzilla.suse.com/892490"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 892723",
        "url": "https://bugzilla.suse.com/892723"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 892782",
        "url": "https://bugzilla.suse.com/892782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 893064",
        "url": "https://bugzilla.suse.com/893064"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 893496",
        "url": "https://bugzilla.suse.com/893496"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 893596",
        "url": "https://bugzilla.suse.com/893596"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 893758",
        "url": "https://bugzilla.suse.com/893758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 894058",
        "url": "https://bugzilla.suse.com/894058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 894200",
        "url": "https://bugzilla.suse.com/894200"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 894213",
        "url": "https://bugzilla.suse.com/894213"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 894895",
        "url": "https://bugzilla.suse.com/894895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 895221",
        "url": "https://bugzilla.suse.com/895221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 895387",
        "url": "https://bugzilla.suse.com/895387"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 895468",
        "url": "https://bugzilla.suse.com/895468"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 895608",
        "url": "https://bugzilla.suse.com/895608"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 895680",
        "url": "https://bugzilla.suse.com/895680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 895841",
        "url": "https://bugzilla.suse.com/895841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 895983",
        "url": "https://bugzilla.suse.com/895983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 896382",
        "url": "https://bugzilla.suse.com/896382"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 896390",
        "url": "https://bugzilla.suse.com/896390"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 896391",
        "url": "https://bugzilla.suse.com/896391"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 896392",
        "url": "https://bugzilla.suse.com/896392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 896415",
        "url": "https://bugzilla.suse.com/896415"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 896484",
        "url": "https://bugzilla.suse.com/896484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 896689",
        "url": "https://bugzilla.suse.com/896689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 897502",
        "url": "https://bugzilla.suse.com/897502"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 897694",
        "url": "https://bugzilla.suse.com/897694"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 897708",
        "url": "https://bugzilla.suse.com/897708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 898295",
        "url": "https://bugzilla.suse.com/898295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 898375",
        "url": "https://bugzilla.suse.com/898375"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 898554",
        "url": "https://bugzilla.suse.com/898554"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 899192",
        "url": "https://bugzilla.suse.com/899192"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 899574",
        "url": "https://bugzilla.suse.com/899574"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 899843",
        "url": "https://bugzilla.suse.com/899843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 900279",
        "url": "https://bugzilla.suse.com/900279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 900644",
        "url": "https://bugzilla.suse.com/900644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 900881",
        "url": "https://bugzilla.suse.com/900881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 901638",
        "url": "https://bugzilla.suse.com/901638"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 902232",
        "url": "https://bugzilla.suse.com/902232"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 902286",
        "url": "https://bugzilla.suse.com/902286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 902346",
        "url": "https://bugzilla.suse.com/902346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 902349",
        "url": "https://bugzilla.suse.com/902349"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 902351",
        "url": "https://bugzilla.suse.com/902351"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 902675",
        "url": "https://bugzilla.suse.com/902675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 903096",
        "url": "https://bugzilla.suse.com/903096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 903331",
        "url": "https://bugzilla.suse.com/903331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 903640",
        "url": "https://bugzilla.suse.com/903640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 903653",
        "url": "https://bugzilla.suse.com/903653"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904013",
        "url": "https://bugzilla.suse.com/904013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904053",
        "url": "https://bugzilla.suse.com/904053"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904242",
        "url": "https://bugzilla.suse.com/904242"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904358",
        "url": "https://bugzilla.suse.com/904358"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904659",
        "url": "https://bugzilla.suse.com/904659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904671",
        "url": "https://bugzilla.suse.com/904671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904700",
        "url": "https://bugzilla.suse.com/904700"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904883",
        "url": "https://bugzilla.suse.com/904883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904901",
        "url": "https://bugzilla.suse.com/904901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 905100",
        "url": "https://bugzilla.suse.com/905100"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 905304",
        "url": "https://bugzilla.suse.com/905304"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 905312",
        "url": "https://bugzilla.suse.com/905312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 905522",
        "url": "https://bugzilla.suse.com/905522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 905799",
        "url": "https://bugzilla.suse.com/905799"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 906027",
        "url": "https://bugzilla.suse.com/906027"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 906586",
        "url": "https://bugzilla.suse.com/906586"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 907196",
        "url": "https://bugzilla.suse.com/907196"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 907338",
        "url": "https://bugzilla.suse.com/907338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 907551",
        "url": "https://bugzilla.suse.com/907551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 907611",
        "url": "https://bugzilla.suse.com/907611"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 907818",
        "url": "https://bugzilla.suse.com/907818"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 908069",
        "url": "https://bugzilla.suse.com/908069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 908163",
        "url": "https://bugzilla.suse.com/908163"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 908393",
        "url": "https://bugzilla.suse.com/908393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 908550",
        "url": "https://bugzilla.suse.com/908550"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 908551",
        "url": "https://bugzilla.suse.com/908551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 908572",
        "url": "https://bugzilla.suse.com/908572"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 908706",
        "url": "https://bugzilla.suse.com/908706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 908825",
        "url": "https://bugzilla.suse.com/908825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909077",
        "url": "https://bugzilla.suse.com/909077"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909078",
        "url": "https://bugzilla.suse.com/909078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909088",
        "url": "https://bugzilla.suse.com/909088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909092",
        "url": "https://bugzilla.suse.com/909092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909093",
        "url": "https://bugzilla.suse.com/909093"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909095",
        "url": "https://bugzilla.suse.com/909095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909264",
        "url": "https://bugzilla.suse.com/909264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909309",
        "url": "https://bugzilla.suse.com/909309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909312",
        "url": "https://bugzilla.suse.com/909312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909477",
        "url": "https://bugzilla.suse.com/909477"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909565",
        "url": "https://bugzilla.suse.com/909565"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909684",
        "url": "https://bugzilla.suse.com/909684"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909740",
        "url": "https://bugzilla.suse.com/909740"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 909846",
        "url": "https://bugzilla.suse.com/909846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 910013",
        "url": "https://bugzilla.suse.com/910013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 910150",
        "url": "https://bugzilla.suse.com/910150"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 910159",
        "url": "https://bugzilla.suse.com/910159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 910251",
        "url": "https://bugzilla.suse.com/910251"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 910321",
        "url": "https://bugzilla.suse.com/910321"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 910322",
        "url": "https://bugzilla.suse.com/910322"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 910517",
        "url": "https://bugzilla.suse.com/910517"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 911181",
        "url": "https://bugzilla.suse.com/911181"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 911325",
        "url": "https://bugzilla.suse.com/911325"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 911326",
        "url": "https://bugzilla.suse.com/911326"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 912171",
        "url": "https://bugzilla.suse.com/912171"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 912202",
        "url": "https://bugzilla.suse.com/912202"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 912705",
        "url": "https://bugzilla.suse.com/912705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 912741",
        "url": "https://bugzilla.suse.com/912741"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 913059",
        "url": "https://bugzilla.suse.com/913059"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 913080",
        "url": "https://bugzilla.suse.com/913080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 913598",
        "url": "https://bugzilla.suse.com/913598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 914355",
        "url": "https://bugzilla.suse.com/914355"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 914423",
        "url": "https://bugzilla.suse.com/914423"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 914726",
        "url": "https://bugzilla.suse.com/914726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 914742",
        "url": "https://bugzilla.suse.com/914742"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 914818",
        "url": "https://bugzilla.suse.com/914818"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 914987",
        "url": "https://bugzilla.suse.com/914987"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915045",
        "url": "https://bugzilla.suse.com/915045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915200",
        "url": "https://bugzilla.suse.com/915200"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915209",
        "url": "https://bugzilla.suse.com/915209"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915322",
        "url": "https://bugzilla.suse.com/915322"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915335",
        "url": "https://bugzilla.suse.com/915335"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915577",
        "url": "https://bugzilla.suse.com/915577"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915791",
        "url": "https://bugzilla.suse.com/915791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 915826",
        "url": "https://bugzilla.suse.com/915826"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 916515",
        "url": "https://bugzilla.suse.com/916515"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 916521",
        "url": "https://bugzilla.suse.com/916521"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 916848",
        "url": "https://bugzilla.suse.com/916848"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 916982",
        "url": "https://bugzilla.suse.com/916982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 917093",
        "url": "https://bugzilla.suse.com/917093"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 917120",
        "url": "https://bugzilla.suse.com/917120"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 917648",
        "url": "https://bugzilla.suse.com/917648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 917684",
        "url": "https://bugzilla.suse.com/917684"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 917830",
        "url": "https://bugzilla.suse.com/917830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 917839",
        "url": "https://bugzilla.suse.com/917839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 917884",
        "url": "https://bugzilla.suse.com/917884"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 918333",
        "url": "https://bugzilla.suse.com/918333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919007",
        "url": "https://bugzilla.suse.com/919007"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919018",
        "url": "https://bugzilla.suse.com/919018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919357",
        "url": "https://bugzilla.suse.com/919357"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919463",
        "url": "https://bugzilla.suse.com/919463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919589",
        "url": "https://bugzilla.suse.com/919589"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919682",
        "url": "https://bugzilla.suse.com/919682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 919808",
        "url": "https://bugzilla.suse.com/919808"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 920250",
        "url": "https://bugzilla.suse.com/920250"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 921769",
        "url": "https://bugzilla.suse.com/921769"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 922583",
        "url": "https://bugzilla.suse.com/922583"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 923344",
        "url": "https://bugzilla.suse.com/923344"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 924142",
        "url": "https://bugzilla.suse.com/924142"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 924271",
        "url": "https://bugzilla.suse.com/924271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 924282",
        "url": "https://bugzilla.suse.com/924282"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 924333",
        "url": "https://bugzilla.suse.com/924333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 924340",
        "url": "https://bugzilla.suse.com/924340"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 925012",
        "url": "https://bugzilla.suse.com/925012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 925370",
        "url": "https://bugzilla.suse.com/925370"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 925443",
        "url": "https://bugzilla.suse.com/925443"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 925567",
        "url": "https://bugzilla.suse.com/925567"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 925729",
        "url": "https://bugzilla.suse.com/925729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 926016",
        "url": "https://bugzilla.suse.com/926016"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 926240",
        "url": "https://bugzilla.suse.com/926240"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 926439",
        "url": "https://bugzilla.suse.com/926439"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 926767",
        "url": "https://bugzilla.suse.com/926767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 927190",
        "url": "https://bugzilla.suse.com/927190"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 927257",
        "url": "https://bugzilla.suse.com/927257"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 927262",
        "url": "https://bugzilla.suse.com/927262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 927338",
        "url": "https://bugzilla.suse.com/927338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 928122",
        "url": "https://bugzilla.suse.com/928122"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 928130",
        "url": "https://bugzilla.suse.com/928130"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 928142",
        "url": "https://bugzilla.suse.com/928142"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 928333",
        "url": "https://bugzilla.suse.com/928333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 928970",
        "url": "https://bugzilla.suse.com/928970"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 929145",
        "url": "https://bugzilla.suse.com/929145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 929148",
        "url": "https://bugzilla.suse.com/929148"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 929283",
        "url": "https://bugzilla.suse.com/929283"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 929525",
        "url": "https://bugzilla.suse.com/929525"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 929647",
        "url": "https://bugzilla.suse.com/929647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 930145",
        "url": "https://bugzilla.suse.com/930145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 930171",
        "url": "https://bugzilla.suse.com/930171"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 930226",
        "url": "https://bugzilla.suse.com/930226"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 930284",
        "url": "https://bugzilla.suse.com/930284"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 930401",
        "url": "https://bugzilla.suse.com/930401"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 930669",
        "url": "https://bugzilla.suse.com/930669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 930786",
        "url": "https://bugzilla.suse.com/930786"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 930788",
        "url": "https://bugzilla.suse.com/930788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 931014",
        "url": "https://bugzilla.suse.com/931014"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 931015",
        "url": "https://bugzilla.suse.com/931015"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 931850",
        "url": "https://bugzilla.suse.com/931850"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2012-2372 page",
        "url": "https://www.suse.com/security/cve/CVE-2012-2372/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2012-4398 page",
        "url": "https://www.suse.com/security/cve/CVE-2012-4398/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-1059 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-1059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-1774 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-1774/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-1819 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-1819/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-1929 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-1929/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-1979 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-1979/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2094 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2094/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2146 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2148 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2148/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2164 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2164/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2206 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2232 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2232/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2234 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2234/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2237 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2237/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2850 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2850/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2851 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2851/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2852 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2852/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2889 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2889/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2893 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2893/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2897 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2899 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2899/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2929 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2929/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2930 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2930/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-3301 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-3301/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4162 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4162/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4163 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4163/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4299 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4299/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4345 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4345/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4470 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4470/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4483 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4483/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4511 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4511/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4514 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4514/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4515 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4515/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4579 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4579/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4587 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4587/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4592 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4592/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6367 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6367/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6368 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6368/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6376 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6376/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6378 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6378/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6380 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6380/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6382 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6382/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6383 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6383/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6463 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6463/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6885 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6885/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7027 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7027/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7263 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7263/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7264 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7264/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7265 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7265/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7339 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7339/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0055 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0055/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0069 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0069/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0077 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0077/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0101 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0101/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0131 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0131/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0155 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0181 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0196 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0196/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-1444 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-1444/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-1445 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-1445/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-1446 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-1446/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-1737 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-1737/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-1738 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-1738/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-1739 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-1739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-1874 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-1874/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2309 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2309/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2523 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2678 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2678/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2706 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2706/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2851 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2851/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3122 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3122/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3144 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3144/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3145 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3153 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3181 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3184 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3185 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3186 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3186/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3601 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3601/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3610 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3646 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3647 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3673 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3673/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3687 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3688 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3690 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3690/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3917 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3917/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4027 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4027/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4171 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4171/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4508 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4508/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4608 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4608/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4652 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4653 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4654 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4654/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4655 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4656 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4667 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4667/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4699 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4699/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-4943 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-4943/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-5077 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-5077/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-5471 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-5471/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-5472 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-5472/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6410 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6410/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-7822 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-7822/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-7826 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-7826/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-7841 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-7841/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-7842 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-7842/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-7970 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-7970/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8086 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8086/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8133 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8133/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8134 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8134/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8159 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8159/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8160 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8369 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8559 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8559/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8709 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8709/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8884 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8884/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9090 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9090/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9322 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9322/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9419 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9419/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9420 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9420/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9529 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9529/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9584 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9584/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9585 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9585/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9683 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9683/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0777 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0777/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-1421 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-1421/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-1593 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-1593/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2041 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2041/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2042 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2042/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2150 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2150/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2830 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2830/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2922 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2922/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-3331 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-3331/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-3339 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-3339/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-3636 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-3636/"
      }
    ],
    "title": "Security update for Linux kernel",
    "tracking": {
      "current_release_date": "2014-09-25T15:06:22Z",
      "generator": {
        "date": "2014-09-25T15:06:22Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2015:0736-1",
      "initial_release_date": "2014-09-25T15:06:22Z",
      "revision_history": [
        {
          "date": "2014-09-25T15:06:22Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
                "product": {
                  "name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
                  "product_id": "cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
                "product": {
                  "name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
                  "product_id": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
                "product": {
                  "name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
                  "product_id": "drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
                "product": {
                  "name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
                  "product_id": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
                "product": {
                  "name": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
                  "product_id": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
                "product": {
                  "name": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
                  "product_id": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-3.0.101.rt130-0.28.1.x86_64",
                "product": {
                  "name": "kernel-rt-3.0.101.rt130-0.28.1.x86_64",
                  "product_id": "kernel-rt-3.0.101.rt130-0.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
                "product": {
                  "name": "kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
                  "product_id": "kernel-rt-base-3.0.101.rt130-0.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
                  "product_id": "kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
                "product": {
                  "name": "kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
                  "product_id": "kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
                "product": {
                  "name": "kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
                  "product_id": "kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
                "product": {
                  "name": "kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
                  "product_id": "kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
                "product": {
                  "name": "kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
                  "product_id": "kernel-source-rt-3.0.101.rt130-0.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
                  "product_id": "kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
                "product": {
                  "name": "lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
                  "product_id": "lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
                "product": {
                  "name": "lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
                  "product_id": "lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
                  "product_id": "ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
                  "product_id": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
                "product": {
                  "name": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
                  "product_id": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
                "product": {
                  "name": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
                  "product_id": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Real Time 11 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Real Time 11 SP3",
                  "product_id": "SUSE Linux Enterprise Real Time 11 SP3"
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64"
        },
        "product_reference": "cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64"
        },
        "product_reference": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64"
        },
        "product_reference": "drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64"
        },
        "product_reference": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64"
        },
        "product_reference": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64"
        },
        "product_reference": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-3.0.101.rt130-0.28.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64"
        },
        "product_reference": "kernel-rt-3.0.101.rt130-0.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-base-3.0.101.rt130-0.28.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64"
        },
        "product_reference": "kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64"
        },
        "product_reference": "kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64"
        },
        "product_reference": "kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64"
        },
        "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-3.0.101.rt130-0.28.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64"
        },
        "product_reference": "kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64"
        },
        "product_reference": "lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64"
        },
        "product_reference": "lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        },
        "product_reference": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP3",
          "product_id": "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        },
        "product_reference": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2012-2372",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2012-2372"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface\u0027s own IP address, as demonstrated by rds-ping.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2012-2372",
          "url": "https://www.suse.com/security/cve/CVE-2012-2372"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 767610 for CVE-2012-2372",
          "url": "https://bugzilla.suse.com/767610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 795039 for CVE-2012-2372",
          "url": "https://bugzilla.suse.com/795039"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2012-2372"
    },
    {
      "cve": "CVE-2012-4398",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2012-4398"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2012-4398",
          "url": "https://www.suse.com/security/cve/CVE-2012-4398"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 778463 for CVE-2012-4398",
          "url": "https://bugzilla.suse.com/778463"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 779488 for CVE-2012-4398",
          "url": "https://bugzilla.suse.com/779488"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2012-4398"
    },
    {
      "cve": "CVE-2013-1059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-1059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/ceph/auth_none.c in the Linux kernel through 3.10 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an auth_reply message that triggers an attempted build_request operation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-1059",
          "url": "https://www.suse.com/security/cve/CVE-2013-1059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 826350 for CVE-2013-1059",
          "url": "https://bugzilla.suse.com/826350"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 882913 for CVE-2013-1059",
          "url": "https://bugzilla.suse.com/882913"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-1059"
    },
    {
      "cve": "CVE-2013-1774",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-1774"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-1774",
          "url": "https://www.suse.com/security/cve/CVE-2013-1774"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 806976 for CVE-2013-1774",
          "url": "https://bugzilla.suse.com/806976"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 807455 for CVE-2013-1774",
          "url": "https://bugzilla.suse.com/807455"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 871595 for CVE-2013-1774",
          "url": "https://bugzilla.suse.com/871595"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-1774"
    },
    {
      "cve": "CVE-2013-1819",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-1819"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The _xfs_buf_find function in fs/xfs/xfs_buf.c in the Linux kernel before 3.7.6 does not validate block numbers, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the ability to mount an XFS filesystem containing a metadata inode with an invalid extent map.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-1819",
          "url": "https://www.suse.com/security/cve/CVE-2013-1819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 807471 for CVE-2013-1819",
          "url": "https://bugzilla.suse.com/807471"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-1819"
    },
    {
      "cve": "CVE-2013-1929",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-1929"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-1929",
          "url": "https://www.suse.com/security/cve/CVE-2013-1929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 813733 for CVE-2013-1929",
          "url": "https://bugzilla.suse.com/813733"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-1929"
    },
    {
      "cve": "CVE-2013-1979",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-1979"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-1979",
          "url": "https://www.suse.com/security/cve/CVE-2013-1979"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 816708 for CVE-2013-1979",
          "url": "https://bugzilla.suse.com/816708"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-1979"
    },
    {
      "cve": "CVE-2013-2094",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2094"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2094",
          "url": "https://www.suse.com/security/cve/CVE-2013-2094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 819789 for CVE-2013-2094",
          "url": "https://bugzilla.suse.com/819789"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820202 for CVE-2013-2094",
          "url": "https://bugzilla.suse.com/820202"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-2094"
    },
    {
      "cve": "CVE-2013-2146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2146",
          "url": "https://www.suse.com/security/cve/CVE-2013-2146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 825006 for CVE-2013-2146",
          "url": "https://bugzilla.suse.com/825006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2146"
    },
    {
      "cve": "CVE-2013-2148",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2148"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2148",
          "url": "https://www.suse.com/security/cve/CVE-2013-2148"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 823517 for CVE-2013-2148",
          "url": "https://bugzilla.suse.com/823517"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2148"
    },
    {
      "cve": "CVE-2013-2164",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2164"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2164",
          "url": "https://www.suse.com/security/cve/CVE-2013-2164"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824295 for CVE-2013-2164",
          "url": "https://bugzilla.suse.com/824295"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-2164"
    },
    {
      "cve": "CVE-2013-2206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2206",
          "url": "https://www.suse.com/security/cve/CVE-2013-2206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 781018 for CVE-2013-2206",
          "url": "https://bugzilla.suse.com/781018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 826102 for CVE-2013-2206",
          "url": "https://bugzilla.suse.com/826102"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-2206"
    },
    {
      "cve": "CVE-2013-2232",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2232"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2232",
          "url": "https://www.suse.com/security/cve/CVE-2013-2232"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 827750 for CVE-2013-2232",
          "url": "https://bugzilla.suse.com/827750"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-2232"
    },
    {
      "cve": "CVE-2013-2234",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2234"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2234",
          "url": "https://www.suse.com/security/cve/CVE-2013-2234"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 827749 for CVE-2013-2234",
          "url": "https://bugzilla.suse.com/827749"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-2234"
    },
    {
      "cve": "CVE-2013-2237",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2237"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2237",
          "url": "https://www.suse.com/security/cve/CVE-2013-2237"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 828119 for CVE-2013-2237",
          "url": "https://bugzilla.suse.com/828119"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2237"
    },
    {
      "cve": "CVE-2013-2850",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2850"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2850",
          "url": "https://www.suse.com/security/cve/CVE-2013-2850"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 821560 for CVE-2013-2850",
          "url": "https://bugzilla.suse.com/821560"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-2850"
    },
    {
      "cve": "CVE-2013-2851",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2851"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Format string vulnerability in the register_disk function in block/genhd.c in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and writing format string specifiers to /sys/module/md_mod/parameters/new_array in order to create a crafted /dev/md device name.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2851",
          "url": "https://www.suse.com/security/cve/CVE-2013-2851"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 822575 for CVE-2013-2851",
          "url": "https://bugzilla.suse.com/822575"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2851"
    },
    {
      "cve": "CVE-2013-2852",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2852"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2852",
          "url": "https://www.suse.com/security/cve/CVE-2013-2852"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 822579 for CVE-2013-2852",
          "url": "https://bugzilla.suse.com/822579"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2852"
    },
    {
      "cve": "CVE-2013-2889",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2889"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2889",
          "url": "https://www.suse.com/security/cve/CVE-2013-2889"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 835839 for CVE-2013-2889",
          "url": "https://bugzilla.suse.com/835839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2889"
    },
    {
      "cve": "CVE-2013-2893",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2893"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2893",
          "url": "https://www.suse.com/security/cve/CVE-2013-2893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 835839 for CVE-2013-2893",
          "url": "https://bugzilla.suse.com/835839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2893"
    },
    {
      "cve": "CVE-2013-2897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2897",
          "url": "https://www.suse.com/security/cve/CVE-2013-2897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1241174 for CVE-2013-2897",
          "url": "https://bugzilla.suse.com/1241174"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 835839 for CVE-2013-2897",
          "url": "https://bugzilla.suse.com/835839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-2897"
    },
    {
      "cve": "CVE-2013-2899",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2899"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2899",
          "url": "https://www.suse.com/security/cve/CVE-2013-2899"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1241177 for CVE-2013-2899",
          "url": "https://bugzilla.suse.com/1241177"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 835839 for CVE-2013-2899",
          "url": "https://bugzilla.suse.com/835839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2899"
    },
    {
      "cve": "CVE-2013-2929",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2929"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2929",
          "url": "https://www.suse.com/security/cve/CVE-2013-2929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824295 for CVE-2013-2929",
          "url": "https://bugzilla.suse.com/824295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 847652 for CVE-2013-2929",
          "url": "https://bugzilla.suse.com/847652"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-2929"
    },
    {
      "cve": "CVE-2013-2930",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2930"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2930",
          "url": "https://www.suse.com/security/cve/CVE-2013-2930"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 849362 for CVE-2013-2930",
          "url": "https://bugzilla.suse.com/849362"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2930"
    },
    {
      "cve": "CVE-2013-3301",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-3301"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then making an lseek system call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-3301",
          "url": "https://www.suse.com/security/cve/CVE-2013-3301"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 815256 for CVE-2013-3301",
          "url": "https://bugzilla.suse.com/815256"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-3301"
    },
    {
      "cve": "CVE-2013-4162",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4162"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4162",
          "url": "https://www.suse.com/security/cve/CVE-2013-4162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831058 for CVE-2013-4162",
          "url": "https://bugzilla.suse.com/831058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4162"
    },
    {
      "cve": "CVE-2013-4163",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4163"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4163",
          "url": "https://www.suse.com/security/cve/CVE-2013-4163"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831055 for CVE-2013-4163",
          "url": "https://bugzilla.suse.com/831055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4163"
    },
    {
      "cve": "CVE-2013-4299",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4299"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4299",
          "url": "https://www.suse.com/security/cve/CVE-2013-4299"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 846404 for CVE-2013-4299",
          "url": "https://bugzilla.suse.com/846404"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4299"
    },
    {
      "cve": "CVE-2013-4345",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4345"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4345",
          "url": "https://www.suse.com/security/cve/CVE-2013-4345"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 840226 for CVE-2013-4345",
          "url": "https://bugzilla.suse.com/840226"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-4345"
    },
    {
      "cve": "CVE-2013-4470",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4470"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4470",
          "url": "https://www.suse.com/security/cve/CVE-2013-4470"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 847672 for CVE-2013-4470",
          "url": "https://bugzilla.suse.com/847672"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4470"
    },
    {
      "cve": "CVE-2013-4483",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4483"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4483",
          "url": "https://www.suse.com/security/cve/CVE-2013-4483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 848321 for CVE-2013-4483",
          "url": "https://bugzilla.suse.com/848321"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4483"
    },
    {
      "cve": "CVE-2013-4511",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4511"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4511",
          "url": "https://www.suse.com/security/cve/CVE-2013-4511"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 849021 for CVE-2013-4511",
          "url": "https://bugzilla.suse.com/849021"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 850263 for CVE-2013-4511",
          "url": "https://bugzilla.suse.com/850263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4511"
    },
    {
      "cve": "CVE-2013-4514",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4514"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4514",
          "url": "https://www.suse.com/security/cve/CVE-2013-4514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 849029 for CVE-2013-4514",
          "url": "https://bugzilla.suse.com/849029"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4514"
    },
    {
      "cve": "CVE-2013-4515",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4515"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4515",
          "url": "https://www.suse.com/security/cve/CVE-2013-4515"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 849034 for CVE-2013-4515",
          "url": "https://bugzilla.suse.com/849034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 850263 for CVE-2013-4515",
          "url": "https://bugzilla.suse.com/850263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4515"
    },
    {
      "cve": "CVE-2013-4579",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4579"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4579",
          "url": "https://www.suse.com/security/cve/CVE-2013-4579"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 851426 for CVE-2013-4579",
          "url": "https://bugzilla.suse.com/851426"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-4579"
    },
    {
      "cve": "CVE-2013-4587",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4587"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4587",
          "url": "https://www.suse.com/security/cve/CVE-2013-4587"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 853050 for CVE-2013-4587",
          "url": "https://bugzilla.suse.com/853050"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 882914 for CVE-2013-4587",
          "url": "https://bugzilla.suse.com/882914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-4587"
    },
    {
      "cve": "CVE-2013-4592",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4592"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4592",
          "url": "https://www.suse.com/security/cve/CVE-2013-4592"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 851101 for CVE-2013-4592",
          "url": "https://bugzilla.suse.com/851101"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-4592"
    },
    {
      "cve": "CVE-2013-6367",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6367"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6367",
          "url": "https://www.suse.com/security/cve/CVE-2013-6367"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 853051 for CVE-2013-6367",
          "url": "https://bugzilla.suse.com/853051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6367"
    },
    {
      "cve": "CVE-2013-6368",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6368"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6368",
          "url": "https://www.suse.com/security/cve/CVE-2013-6368"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 853052 for CVE-2013-6368",
          "url": "https://bugzilla.suse.com/853052"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6368"
    },
    {
      "cve": "CVE-2013-6376",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6376"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6376",
          "url": "https://www.suse.com/security/cve/CVE-2013-6376"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 853053 for CVE-2013-6376",
          "url": "https://bugzilla.suse.com/853053"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6376"
    },
    {
      "cve": "CVE-2013-6378",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6378"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6378",
          "url": "https://www.suse.com/security/cve/CVE-2013-6378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 852559 for CVE-2013-6378",
          "url": "https://bugzilla.suse.com/852559"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6378"
    },
    {
      "cve": "CVE-2013-6380",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6380"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6380",
          "url": "https://www.suse.com/security/cve/CVE-2013-6380"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 852373 for CVE-2013-6380",
          "url": "https://bugzilla.suse.com/852373"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6380"
    },
    {
      "cve": "CVE-2013-6382",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6382"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6382",
          "url": "https://www.suse.com/security/cve/CVE-2013-6382"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 852553 for CVE-2013-6382",
          "url": "https://bugzilla.suse.com/852553"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6382"
    },
    {
      "cve": "CVE-2013-6383",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6383"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6383",
          "url": "https://www.suse.com/security/cve/CVE-2013-6383"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 852558 for CVE-2013-6383",
          "url": "https://bugzilla.suse.com/852558"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6383"
    },
    {
      "cve": "CVE-2013-6463",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6463"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, CVE-2013-7271.  Reason: This candidate is a duplicate of CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and CVE-2013-7271.  Notes: All CVE users should reference CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and/or CVE-2013-7271 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6463",
          "url": "https://www.suse.com/security/cve/CVE-2013-6463"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 854722 for CVE-2013-6463",
          "url": "https://bugzilla.suse.com/854722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 857643 for CVE-2013-6463",
          "url": "https://bugzilla.suse.com/857643"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-6463"
    },
    {
      "cve": "CVE-2013-6885",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6885"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6885",
          "url": "https://www.suse.com/security/cve/CVE-2013-6885"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 849668 for CVE-2013-6885",
          "url": "https://bugzilla.suse.com/849668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 852967 for CVE-2013-6885",
          "url": "https://bugzilla.suse.com/852967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 853049 for CVE-2013-6885",
          "url": "https://bugzilla.suse.com/853049"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-6885"
    },
    {
      "cve": "CVE-2013-7027",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7027"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7027",
          "url": "https://www.suse.com/security/cve/CVE-2013-7027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 854634 for CVE-2013-7027",
          "url": "https://bugzilla.suse.com/854634"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-7027"
    },
    {
      "cve": "CVE-2013-7263",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7263"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7263",
          "url": "https://www.suse.com/security/cve/CVE-2013-7263"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 853040 for CVE-2013-7263",
          "url": "https://bugzilla.suse.com/853040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 857643 for CVE-2013-7263",
          "url": "https://bugzilla.suse.com/857643"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-7263"
    },
    {
      "cve": "CVE-2013-7264",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7264"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7264",
          "url": "https://www.suse.com/security/cve/CVE-2013-7264"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 853040 for CVE-2013-7264",
          "url": "https://bugzilla.suse.com/853040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 857643 for CVE-2013-7264",
          "url": "https://bugzilla.suse.com/857643"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-7264"
    },
    {
      "cve": "CVE-2013-7265",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7265"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7265",
          "url": "https://www.suse.com/security/cve/CVE-2013-7265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 853040 for CVE-2013-7265",
          "url": "https://bugzilla.suse.com/853040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 857643 for CVE-2013-7265",
          "url": "https://bugzilla.suse.com/857643"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-7265"
    },
    {
      "cve": "CVE-2013-7339",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7339"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7339",
          "url": "https://www.suse.com/security/cve/CVE-2013-7339"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 869563 for CVE-2013-7339",
          "url": "https://bugzilla.suse.com/869563"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-7339"
    },
    {
      "cve": "CVE-2014-0055",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0055"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0055",
          "url": "https://www.suse.com/security/cve/CVE-2014-0055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 870173 for CVE-2014-0055",
          "url": "https://bugzilla.suse.com/870173"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-0055"
    },
    {
      "cve": "CVE-2014-0069",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0069"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0069",
          "url": "https://www.suse.com/security/cve/CVE-2014-0069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 864025 for CVE-2014-0069",
          "url": "https://bugzilla.suse.com/864025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-0069"
    },
    {
      "cve": "CVE-2014-0077",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0077"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0077",
          "url": "https://www.suse.com/security/cve/CVE-2014-0077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 870173 for CVE-2014-0077",
          "url": "https://bugzilla.suse.com/870173"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 870576 for CVE-2014-0077",
          "url": "https://bugzilla.suse.com/870576"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-0077"
    },
    {
      "cve": "CVE-2014-0101",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0101"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0101",
          "url": "https://www.suse.com/security/cve/CVE-2014-0101"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2014-0101",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 866102 for CVE-2014-0101",
          "url": "https://bugzilla.suse.com/866102"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-0101"
    },
    {
      "cve": "CVE-2014-0131",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0131"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0131",
          "url": "https://www.suse.com/security/cve/CVE-2014-0131"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824295 for CVE-2014-0131",
          "url": "https://bugzilla.suse.com/824295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 867723 for CVE-2014-0131",
          "url": "https://bugzilla.suse.com/867723"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 869564 for CVE-2014-0131",
          "url": "https://bugzilla.suse.com/869564"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 889071 for CVE-2014-0131",
          "url": "https://bugzilla.suse.com/889071"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-0131"
    },
    {
      "cve": "CVE-2014-0155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC.  NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0155",
          "url": "https://www.suse.com/security/cve/CVE-2014-0155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824295 for CVE-2014-0155",
          "url": "https://bugzilla.suse.com/824295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 872540 for CVE-2014-0155",
          "url": "https://bugzilla.suse.com/872540"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-0155"
    },
    {
      "cve": "CVE-2014-0181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0181",
          "url": "https://www.suse.com/security/cve/CVE-2014-0181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 875051 for CVE-2014-0181",
          "url": "https://bugzilla.suse.com/875051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-0181"
    },
    {
      "cve": "CVE-2014-0196",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0196"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the \"LECHO \u0026 !OPOST\" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0196",
          "url": "https://www.suse.com/security/cve/CVE-2014-0196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 871252 for CVE-2014-0196",
          "url": "https://bugzilla.suse.com/871252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 875690 for CVE-2014-0196",
          "url": "https://bugzilla.suse.com/875690"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 877345 for CVE-2014-0196",
          "url": "https://bugzilla.suse.com/877345"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 879878 for CVE-2014-0196",
          "url": "https://bugzilla.suse.com/879878"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 933423 for CVE-2014-0196",
          "url": "https://bugzilla.suse.com/933423"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-0196"
    },
    {
      "cve": "CVE-2014-1444",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-1444"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-1444",
          "url": "https://www.suse.com/security/cve/CVE-2014-1444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 858869 for CVE-2014-1444",
          "url": "https://bugzilla.suse.com/858869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-1444"
    },
    {
      "cve": "CVE-2014-1445",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-1445"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-1445",
          "url": "https://www.suse.com/security/cve/CVE-2014-1445"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 858870 for CVE-2014-1445",
          "url": "https://bugzilla.suse.com/858870"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-1445"
    },
    {
      "cve": "CVE-2014-1446",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-1446"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-1446",
          "url": "https://www.suse.com/security/cve/CVE-2014-1446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 858872 for CVE-2014-1446",
          "url": "https://bugzilla.suse.com/858872"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-1446"
    },
    {
      "cve": "CVE-2014-1737",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-1737"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-1737",
          "url": "https://www.suse.com/security/cve/CVE-2014-1737"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2014-1737",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 875798 for CVE-2014-1737",
          "url": "https://bugzilla.suse.com/875798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 877345 for CVE-2014-1737",
          "url": "https://bugzilla.suse.com/877345"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-1737"
    },
    {
      "cve": "CVE-2014-1738",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-1738"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-1738",
          "url": "https://www.suse.com/security/cve/CVE-2014-1738"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 875798 for CVE-2014-1738",
          "url": "https://bugzilla.suse.com/875798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 877345 for CVE-2014-1738",
          "url": "https://bugzilla.suse.com/877345"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-1738"
    },
    {
      "cve": "CVE-2014-1739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-1739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-1739",
          "url": "https://www.suse.com/security/cve/CVE-2014-1739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 882804 for CVE-2014-1739",
          "url": "https://bugzilla.suse.com/882804"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-1739"
    },
    {
      "cve": "CVE-2014-1874",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-1874"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-1874",
          "url": "https://www.suse.com/security/cve/CVE-2014-1874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 863335 for CVE-2014-1874",
          "url": "https://bugzilla.suse.com/863335"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-1874"
    },
    {
      "cve": "CVE-2014-2309",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2309"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2309",
          "url": "https://www.suse.com/security/cve/CVE-2014-2309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824295 for CVE-2014-2309",
          "url": "https://bugzilla.suse.com/824295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 867531 for CVE-2014-2309",
          "url": "https://bugzilla.suse.com/867531"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-2309"
    },
    {
      "cve": "CVE-2014-2523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2523",
          "url": "https://www.suse.com/security/cve/CVE-2014-2523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2014-2523",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 868653 for CVE-2014-2523",
          "url": "https://bugzilla.suse.com/868653"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-2523"
    },
    {
      "cve": "CVE-2014-2678",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2678"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2678",
          "url": "https://www.suse.com/security/cve/CVE-2014-2678"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 871561 for CVE-2014-2678",
          "url": "https://bugzilla.suse.com/871561"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-2678"
    },
    {
      "cve": "CVE-2014-2706",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2706"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2706",
          "url": "https://www.suse.com/security/cve/CVE-2014-2706"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2014-2706",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 871797 for CVE-2014-2706",
          "url": "https://bugzilla.suse.com/871797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-2706"
    },
    {
      "cve": "CVE-2014-2851",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2851"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2851",
          "url": "https://www.suse.com/security/cve/CVE-2014-2851"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824295 for CVE-2014-2851",
          "url": "https://bugzilla.suse.com/824295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 873374 for CVE-2014-2851",
          "url": "https://bugzilla.suse.com/873374"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-2851"
    },
    {
      "cve": "CVE-2014-3122",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3122"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3122",
          "url": "https://www.suse.com/security/cve/CVE-2014-3122"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824295 for CVE-2014-3122",
          "url": "https://bugzilla.suse.com/824295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 876102 for CVE-2014-3122",
          "url": "https://bugzilla.suse.com/876102"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-3122"
    },
    {
      "cve": "CVE-2014-3144",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3144"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3144",
          "url": "https://www.suse.com/security/cve/CVE-2014-3144"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824295 for CVE-2014-3144",
          "url": "https://bugzilla.suse.com/824295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 877257 for CVE-2014-3144",
          "url": "https://bugzilla.suse.com/877257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 889071 for CVE-2014-3144",
          "url": "https://bugzilla.suse.com/889071"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3144"
    },
    {
      "cve": "CVE-2014-3145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3145",
          "url": "https://www.suse.com/security/cve/CVE-2014-3145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824295 for CVE-2014-3145",
          "url": "https://bugzilla.suse.com/824295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 877257 for CVE-2014-3145",
          "url": "https://bugzilla.suse.com/877257"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3145"
    },
    {
      "cve": "CVE-2014-3153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3153",
          "url": "https://www.suse.com/security/cve/CVE-2014-3153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 877775 for CVE-2014-3153",
          "url": "https://bugzilla.suse.com/877775"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 880892 for CVE-2014-3153",
          "url": "https://bugzilla.suse.com/880892"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 882228 for CVE-2014-3153",
          "url": "https://bugzilla.suse.com/882228"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-3153"
    },
    {
      "cve": "CVE-2014-3181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3181",
          "url": "https://www.suse.com/security/cve/CVE-2014-3181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 896382 for CVE-2014-3181",
          "url": "https://bugzilla.suse.com/896382"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3181"
    },
    {
      "cve": "CVE-2014-3184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3184",
          "url": "https://www.suse.com/security/cve/CVE-2014-3184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 896390 for CVE-2014-3184",
          "url": "https://bugzilla.suse.com/896390"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3184"
    },
    {
      "cve": "CVE-2014-3185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3185",
          "url": "https://www.suse.com/security/cve/CVE-2014-3185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 896391 for CVE-2014-3185",
          "url": "https://bugzilla.suse.com/896391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3185"
    },
    {
      "cve": "CVE-2014-3186",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3186"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3186",
          "url": "https://www.suse.com/security/cve/CVE-2014-3186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 896392 for CVE-2014-3186",
          "url": "https://bugzilla.suse.com/896392"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3186"
    },
    {
      "cve": "CVE-2014-3601",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3601"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3601",
          "url": "https://www.suse.com/security/cve/CVE-2014-3601"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 892782 for CVE-2014-3601",
          "url": "https://bugzilla.suse.com/892782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 902675 for CVE-2014-3601",
          "url": "https://bugzilla.suse.com/902675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3601"
    },
    {
      "cve": "CVE-2014-3610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3610",
          "url": "https://www.suse.com/security/cve/CVE-2014-3610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 899192 for CVE-2014-3610",
          "url": "https://bugzilla.suse.com/899192"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3610"
    },
    {
      "cve": "CVE-2014-3646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3646",
          "url": "https://www.suse.com/security/cve/CVE-2014-3646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 899192 for CVE-2014-3646",
          "url": "https://bugzilla.suse.com/899192"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3646"
    },
    {
      "cve": "CVE-2014-3647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3647",
          "url": "https://www.suse.com/security/cve/CVE-2014-3647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1013038 for CVE-2014-3647",
          "url": "https://bugzilla.suse.com/1013038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1134834 for CVE-2014-3647",
          "url": "https://bugzilla.suse.com/1134834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 899192 for CVE-2014-3647",
          "url": "https://bugzilla.suse.com/899192"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3647"
    },
    {
      "cve": "CVE-2014-3673",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3673"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3673",
          "url": "https://www.suse.com/security/cve/CVE-2014-3673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2014-3673",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 902346 for CVE-2014-3673",
          "url": "https://bugzilla.suse.com/902346"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 902349 for CVE-2014-3673",
          "url": "https://bugzilla.suse.com/902349"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 904899 for CVE-2014-3673",
          "url": "https://bugzilla.suse.com/904899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-3673"
    },
    {
      "cve": "CVE-2014-3687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3687",
          "url": "https://www.suse.com/security/cve/CVE-2014-3687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2014-3687",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 902349 for CVE-2014-3687",
          "url": "https://bugzilla.suse.com/902349"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 904899 for CVE-2014-3687",
          "url": "https://bugzilla.suse.com/904899"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 909208 for CVE-2014-3687",
          "url": "https://bugzilla.suse.com/909208"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-3687"
    },
    {
      "cve": "CVE-2014-3688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association\u0027s output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3688",
          "url": "https://www.suse.com/security/cve/CVE-2014-3688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 902351 for CVE-2014-3688",
          "url": "https://bugzilla.suse.com/902351"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3688"
    },
    {
      "cve": "CVE-2014-3690",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3690"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3690",
          "url": "https://www.suse.com/security/cve/CVE-2014-3690"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 902232 for CVE-2014-3690",
          "url": "https://bugzilla.suse.com/902232"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3690"
    },
    {
      "cve": "CVE-2014-3917",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3917"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3917",
          "url": "https://www.suse.com/security/cve/CVE-2014-3917"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 880484 for CVE-2014-3917",
          "url": "https://bugzilla.suse.com/880484"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-3917"
    },
    {
      "cve": "CVE-2014-4027",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4027"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4027",
          "url": "https://www.suse.com/security/cve/CVE-2014-4027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 882639 for CVE-2014-4027",
          "url": "https://bugzilla.suse.com/882639"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-4027"
    },
    {
      "cve": "CVE-2014-4171",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4171"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4171",
          "url": "https://www.suse.com/security/cve/CVE-2014-4171"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 883518 for CVE-2014-4171",
          "url": "https://bugzilla.suse.com/883518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-4171"
    },
    {
      "cve": "CVE-2014-4508",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4508"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4508",
          "url": "https://www.suse.com/security/cve/CVE-2014-4508"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 883724 for CVE-2014-4508",
          "url": "https://bugzilla.suse.com/883724"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-4508"
    },
    {
      "cve": "CVE-2014-4608",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4608"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run.  NOTE: the author of the LZO algorithms says \"the Linux kernel is *not* affected; media hype.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4608",
          "url": "https://www.suse.com/security/cve/CVE-2014-4608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 883948 for CVE-2014-4608",
          "url": "https://bugzilla.suse.com/883948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 889071 for CVE-2014-4608",
          "url": "https://bugzilla.suse.com/889071"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-4608"
    },
    {
      "cve": "CVE-2014-4652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4652",
          "url": "https://www.suse.com/security/cve/CVE-2014-4652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 883795 for CVE-2014-4652",
          "url": "https://bugzilla.suse.com/883795"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-4652"
    },
    {
      "cve": "CVE-2014-4653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4653",
          "url": "https://www.suse.com/security/cve/CVE-2014-4653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 883795 for CVE-2014-4653",
          "url": "https://bugzilla.suse.com/883795"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-4653"
    },
    {
      "cve": "CVE-2014-4654",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4654"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4654",
          "url": "https://www.suse.com/security/cve/CVE-2014-4654"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 883795 for CVE-2014-4654",
          "url": "https://bugzilla.suse.com/883795"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-4654"
    },
    {
      "cve": "CVE-2014-4655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4655",
          "url": "https://www.suse.com/security/cve/CVE-2014-4655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 883795 for CVE-2014-4655",
          "url": "https://bugzilla.suse.com/883795"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-4655"
    },
    {
      "cve": "CVE-2014-4656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4656",
          "url": "https://www.suse.com/security/cve/CVE-2014-4656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 883795 for CVE-2014-4656",
          "url": "https://bugzilla.suse.com/883795"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-4656"
    },
    {
      "cve": "CVE-2014-4667",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4667"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4667",
          "url": "https://www.suse.com/security/cve/CVE-2014-4667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 885422 for CVE-2014-4667",
          "url": "https://bugzilla.suse.com/885422"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-4667"
    },
    {
      "cve": "CVE-2014-4699",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4699"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4699",
          "url": "https://www.suse.com/security/cve/CVE-2014-4699"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 885725 for CVE-2014-4699",
          "url": "https://bugzilla.suse.com/885725"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-4699"
    },
    {
      "cve": "CVE-2014-4943",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-4943"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-4943",
          "url": "https://www.suse.com/security/cve/CVE-2014-4943"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 887082 for CVE-2014-4943",
          "url": "https://bugzilla.suse.com/887082"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-4943"
    },
    {
      "cve": "CVE-2014-5077",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-5077"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-5077",
          "url": "https://www.suse.com/security/cve/CVE-2014-5077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 889173 for CVE-2014-5077",
          "url": "https://bugzilla.suse.com/889173"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-5077"
    },
    {
      "cve": "CVE-2014-5471",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-5471"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-5471",
          "url": "https://www.suse.com/security/cve/CVE-2014-5471"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 892490 for CVE-2014-5471",
          "url": "https://bugzilla.suse.com/892490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-5471"
    },
    {
      "cve": "CVE-2014-5472",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-5472"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-5472",
          "url": "https://www.suse.com/security/cve/CVE-2014-5472"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 892490 for CVE-2014-5472",
          "url": "https://bugzilla.suse.com/892490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-5472"
    },
    {
      "cve": "CVE-2014-6410",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6410"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6410",
          "url": "https://www.suse.com/security/cve/CVE-2014-6410"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 896689 for CVE-2014-6410",
          "url": "https://bugzilla.suse.com/896689"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-6410"
    },
    {
      "cve": "CVE-2014-7822",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-7822"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-7822",
          "url": "https://www.suse.com/security/cve/CVE-2014-7822"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2014-7822",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 915322 for CVE-2014-7822",
          "url": "https://bugzilla.suse.com/915322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 915517 for CVE-2014-7822",
          "url": "https://bugzilla.suse.com/915517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 939240 for CVE-2014-7822",
          "url": "https://bugzilla.suse.com/939240"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-7822"
    },
    {
      "cve": "CVE-2014-7826",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-7826"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-7826",
          "url": "https://www.suse.com/security/cve/CVE-2014-7826"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 904012 for CVE-2014-7826",
          "url": "https://bugzilla.suse.com/904012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 904013 for CVE-2014-7826",
          "url": "https://bugzilla.suse.com/904013"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-7826"
    },
    {
      "cve": "CVE-2014-7841",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-7841"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-7841",
          "url": "https://www.suse.com/security/cve/CVE-2014-7841"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 904899 for CVE-2014-7841",
          "url": "https://bugzilla.suse.com/904899"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905100 for CVE-2014-7841",
          "url": "https://bugzilla.suse.com/905100"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-7841"
    },
    {
      "cve": "CVE-2014-7842",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-7842"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-7842",
          "url": "https://www.suse.com/security/cve/CVE-2014-7842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905312 for CVE-2014-7842",
          "url": "https://bugzilla.suse.com/905312"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 907822 for CVE-2014-7842",
          "url": "https://bugzilla.suse.com/907822"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-7842"
    },
    {
      "cve": "CVE-2014-7970",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-7970"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-7970",
          "url": "https://www.suse.com/security/cve/CVE-2014-7970"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 900644 for CVE-2014-7970",
          "url": "https://bugzilla.suse.com/900644"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-7970"
    },
    {
      "cve": "CVE-2014-8086",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8086"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8086",
          "url": "https://www.suse.com/security/cve/CVE-2014-8086"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 900881 for CVE-2014-8086",
          "url": "https://bugzilla.suse.com/900881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-8086"
    },
    {
      "cve": "CVE-2014-8133",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8133"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8133",
          "url": "https://www.suse.com/security/cve/CVE-2014-8133"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 817142 for CVE-2014-8133",
          "url": "https://bugzilla.suse.com/817142"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 906545 for CVE-2014-8133",
          "url": "https://bugzilla.suse.com/906545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 907818 for CVE-2014-8133",
          "url": "https://bugzilla.suse.com/907818"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 909077 for CVE-2014-8133",
          "url": "https://bugzilla.suse.com/909077"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-8133"
    },
    {
      "cve": "CVE-2014-8134",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8134"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8134",
          "url": "https://www.suse.com/security/cve/CVE-2014-8134"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 907818 for CVE-2014-8134",
          "url": "https://bugzilla.suse.com/907818"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 909077 for CVE-2014-8134",
          "url": "https://bugzilla.suse.com/909077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 909078 for CVE-2014-8134",
          "url": "https://bugzilla.suse.com/909078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-8134"
    },
    {
      "cve": "CVE-2014-8159",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8159"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8159",
          "url": "https://www.suse.com/security/cve/CVE-2014-8159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903967 for CVE-2014-8159",
          "url": "https://bugzilla.suse.com/903967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 914742 for CVE-2014-8159",
          "url": "https://bugzilla.suse.com/914742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 939241 for CVE-2014-8159",
          "url": "https://bugzilla.suse.com/939241"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-8159"
    },
    {
      "cve": "CVE-2014-8160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8160",
          "url": "https://www.suse.com/security/cve/CVE-2014-8160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 857643 for CVE-2014-8160",
          "url": "https://bugzilla.suse.com/857643"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 913059 for CVE-2014-8160",
          "url": "https://bugzilla.suse.com/913059"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-8160"
    },
    {
      "cve": "CVE-2014-8369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8369",
          "url": "https://www.suse.com/security/cve/CVE-2014-8369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 892782 for CVE-2014-8369",
          "url": "https://bugzilla.suse.com/892782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 902675 for CVE-2014-8369",
          "url": "https://bugzilla.suse.com/902675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-8369"
    },
    {
      "cve": "CVE-2014-8559",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8559"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8559",
          "url": "https://www.suse.com/security/cve/CVE-2014-8559"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903640 for CVE-2014-8559",
          "url": "https://bugzilla.suse.com/903640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 915517 for CVE-2014-8559",
          "url": "https://bugzilla.suse.com/915517"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-8559"
    },
    {
      "cve": "CVE-2014-8709",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8709"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8709",
          "url": "https://www.suse.com/security/cve/CVE-2014-8709"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 904700 for CVE-2014-8709",
          "url": "https://bugzilla.suse.com/904700"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-8709"
    },
    {
      "cve": "CVE-2014-8884",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8884"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8884",
          "url": "https://www.suse.com/security/cve/CVE-2014-8884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 904876 for CVE-2014-8884",
          "url": "https://bugzilla.suse.com/904876"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905522 for CVE-2014-8884",
          "url": "https://bugzilla.suse.com/905522"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905739 for CVE-2014-8884",
          "url": "https://bugzilla.suse.com/905739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905744 for CVE-2014-8884",
          "url": "https://bugzilla.suse.com/905744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905748 for CVE-2014-8884",
          "url": "https://bugzilla.suse.com/905748"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905764 for CVE-2014-8884",
          "url": "https://bugzilla.suse.com/905764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-8884"
    },
    {
      "cve": "CVE-2014-9090",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9090"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9090",
          "url": "https://www.suse.com/security/cve/CVE-2014-9090"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 817142 for CVE-2014-9090",
          "url": "https://bugzilla.suse.com/817142"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 907818 for CVE-2014-9090",
          "url": "https://bugzilla.suse.com/907818"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 909077 for CVE-2014-9090",
          "url": "https://bugzilla.suse.com/909077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 910251 for CVE-2014-9090",
          "url": "https://bugzilla.suse.com/910251"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-9090"
    },
    {
      "cve": "CVE-2014-9322",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9322"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9322",
          "url": "https://www.suse.com/security/cve/CVE-2014-9322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2014-9322",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 817142 for CVE-2014-9322",
          "url": "https://bugzilla.suse.com/817142"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 910251 for CVE-2014-9322",
          "url": "https://bugzilla.suse.com/910251"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-9322"
    },
    {
      "cve": "CVE-2014-9419",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9419"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9419",
          "url": "https://www.suse.com/security/cve/CVE-2014-9419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 911326 for CVE-2014-9419",
          "url": "https://bugzilla.suse.com/911326"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-9419"
    },
    {
      "cve": "CVE-2014-9420",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9420"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9420",
          "url": "https://www.suse.com/security/cve/CVE-2014-9420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 906545 for CVE-2014-9420",
          "url": "https://bugzilla.suse.com/906545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 911325 for CVE-2014-9420",
          "url": "https://bugzilla.suse.com/911325"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-9420"
    },
    {
      "cve": "CVE-2014-9529",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9529"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9529",
          "url": "https://www.suse.com/security/cve/CVE-2014-9529"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072204 for CVE-2014-9529",
          "url": "https://bugzilla.suse.com/1072204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2014-9529",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 912202 for CVE-2014-9529",
          "url": "https://bugzilla.suse.com/912202"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-9529"
    },
    {
      "cve": "CVE-2014-9584",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9584"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9584",
          "url": "https://www.suse.com/security/cve/CVE-2014-9584"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 912654 for CVE-2014-9584",
          "url": "https://bugzilla.suse.com/912654"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-9584"
    },
    {
      "cve": "CVE-2014-9585",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9585"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9585",
          "url": "https://www.suse.com/security/cve/CVE-2014-9585"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 912705 for CVE-2014-9585",
          "url": "https://bugzilla.suse.com/912705"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-9585"
    },
    {
      "cve": "CVE-2014-9683",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9683"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9683",
          "url": "https://www.suse.com/security/cve/CVE-2014-9683"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 918333 for CVE-2014-9683",
          "url": "https://bugzilla.suse.com/918333"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2014-9683"
    },
    {
      "cve": "CVE-2015-0777",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0777"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0777",
          "url": "https://www.suse.com/security/cve/CVE-2015-0777"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 917830 for CVE-2015-0777",
          "url": "https://bugzilla.suse.com/917830"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-0777"
    },
    {
      "cve": "CVE-2015-1421",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-1421"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-1421",
          "url": "https://www.suse.com/security/cve/CVE-2015-1421"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2015-1421",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 915577 for CVE-2015-1421",
          "url": "https://bugzilla.suse.com/915577"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922004 for CVE-2015-1421",
          "url": "https://bugzilla.suse.com/922004"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 939261 for CVE-2015-1421",
          "url": "https://bugzilla.suse.com/939261"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-1421"
    },
    {
      "cve": "CVE-2015-1593",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-1593"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-1593",
          "url": "https://www.suse.com/security/cve/CVE-2015-1593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1044934 for CVE-2015-1593",
          "url": "https://bugzilla.suse.com/1044934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 917839 for CVE-2015-1593",
          "url": "https://bugzilla.suse.com/917839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-1593"
    },
    {
      "cve": "CVE-2015-2041",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2041"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2041",
          "url": "https://www.suse.com/security/cve/CVE-2015-2041"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903967 for CVE-2015-2041",
          "url": "https://bugzilla.suse.com/903967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 919007 for CVE-2015-2041",
          "url": "https://bugzilla.suse.com/919007"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2041"
    },
    {
      "cve": "CVE-2015-2042",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2042"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2042",
          "url": "https://www.suse.com/security/cve/CVE-2015-2042"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903967 for CVE-2015-2042",
          "url": "https://bugzilla.suse.com/903967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 919018 for CVE-2015-2042",
          "url": "https://bugzilla.suse.com/919018"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2042"
    },
    {
      "cve": "CVE-2015-2150",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2150"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2150",
          "url": "https://www.suse.com/security/cve/CVE-2015-2150"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 800280 for CVE-2015-2150",
          "url": "https://bugzilla.suse.com/800280"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903967 for CVE-2015-2150",
          "url": "https://bugzilla.suse.com/903967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 919463 for CVE-2015-2150",
          "url": "https://bugzilla.suse.com/919463"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2150"
    },
    {
      "cve": "CVE-2015-2830",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2830"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2830",
          "url": "https://www.suse.com/security/cve/CVE-2015-2830"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903967 for CVE-2015-2830",
          "url": "https://bugzilla.suse.com/903967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 926240 for CVE-2015-2830",
          "url": "https://bugzilla.suse.com/926240"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2830"
    },
    {
      "cve": "CVE-2015-2922",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2922"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2922",
          "url": "https://www.suse.com/security/cve/CVE-2015-2922"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903967 for CVE-2015-2922",
          "url": "https://bugzilla.suse.com/903967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922583 for CVE-2015-2922",
          "url": "https://bugzilla.suse.com/922583"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 926223 for CVE-2015-2922",
          "url": "https://bugzilla.suse.com/926223"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2922"
    },
    {
      "cve": "CVE-2015-3331",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-3331"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-3331",
          "url": "https://www.suse.com/security/cve/CVE-2015-3331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2015-3331",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 927257 for CVE-2015-3331",
          "url": "https://bugzilla.suse.com/927257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 931231 for CVE-2015-3331",
          "url": "https://bugzilla.suse.com/931231"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 939262 for CVE-2015-3331",
          "url": "https://bugzilla.suse.com/939262"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2015-3331"
    },
    {
      "cve": "CVE-2015-3339",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-3339"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-3339",
          "url": "https://www.suse.com/security/cve/CVE-2015-3339"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903967 for CVE-2015-3339",
          "url": "https://bugzilla.suse.com/903967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 928130 for CVE-2015-3339",
          "url": "https://bugzilla.suse.com/928130"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 939263 for CVE-2015-3339",
          "url": "https://bugzilla.suse.com/939263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-3339"
    },
    {
      "cve": "CVE-2015-3636",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-3636"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
          "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-3636",
          "url": "https://www.suse.com/security/cve/CVE-2015-3636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 929525 for CVE-2015-3636",
          "url": "https://bugzilla.suse.com/929525"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 939277 for CVE-2015-3636",
          "url": "https://bugzilla.suse.com/939277"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 994624 for CVE-2015-3636",
          "url": "https://bugzilla.suse.com/994624"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-base-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-rt_trace-devel-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-source-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:kernel-syms-rt-3.0.101.rt130-0.28.1.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64",
            "SUSE Linux Enterprise Real Time 11 SP3:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-09-25T15:06:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-3636"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…