SUSE-SU-2015:2292-1

Vulnerability from csaf_suse - Published: 2015-12-17 12:08 - Updated: 2015-12-17 12:08
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.51 to receive various security and bugfixes. Following features were added: - hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784). Following security bugs were fixed: - CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. (bsc#955354) - CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776). - CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440). - CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936). - CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux kernel did not properly handle rename actions inside a bind mount, which allowed local users to bypass an intended container protection mechanism by renaming a directory, related to a 'double-chroot attack (bnc#926238). - CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384). The following non-security bugs were fixed: - af_iucv: avoid path quiesce of severed path in shutdown() (bnc#954986, LTC#131684). - alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440). - alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504). - alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504). - apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949). - audit: correctly record file names with different path name types (bsc#950013). - audit: create private file name copies when auditing inodes (bsc#950013). - bcache: Add btree_insert_node() (bnc#951638). - bcache: Add explicit keylist arg to btree_insert() (bnc#951638). - bcache: backing device set to clean after finishing detach (bsc#951638). - bcache: backing device set to clean after finishing detach (bsc#951638). - bcache: Clean up keylist code (bnc#951638). - bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638). - bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638). - bcache: Convert try_wait to wait_queue_head_t (bnc#951638). - bcache: Explicitly track btree node's parent (bnc#951638). - bcache: Fix a bug when detaching (bsc#951638). - bcache: Fix a lockdep splat in an error path (bnc#951638). - bcache: Fix a shutdown bug (bsc#951638). - bcache: Fix more early shutdown bugs (bsc#951638). - bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638). - bcache: Insert multiple keys at a time (bnc#951638). - bcache: kill closure locking usage (bnc#951638). - bcache: Refactor journalling flow control (bnc#951638). - bcache: Refactor request_write() (bnc#951638). - bcache: Use blkdev_issue_discard() (bnc#951638). - btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647). - btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647). - btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647). - btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647). - btrfs: fix condition of commit transaction (bsc#958647). - btrfs: fix condition of commit transaction (bsc#958647). - btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053). - btrfs: Fix out-of-space bug (bsc#958647). - btrfs: Fix out-of-space bug (bsc#958647). - btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647). - btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647). - btrfs: fix the number of transaction units needed to remove a block group (bsc#958647). - btrfs: fix the number of transaction units needed to remove a block group (bsc#958647). - btrfs: fix truncation of compressed and inlined extents (bnc#956053). - btrfs: Set relative data on clear btrfs_block_group_cache->pinned (bsc#958647). - btrfs: Set relative data on clear btrfs_block_group_cache->pinned (bsc#958647). - btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647). - btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647). - cache: Fix sysfs splat on shutdown with flash only devs (bsc#951638). - cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773). - cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#957395). - cxgb4i: Increased the value of MAX_IMM_TX_PKT_LEN from 128 to 256 bytes (bsc#950580). - dlm: make posix locks interruptible, (bsc#947241). - dmapi: Fix xfs dmapi to not unlock & lock XFS_ILOCK_EXCL (bsc#949744). - dm: do not start current request if it would've merged with the previous (bsc#904348). - dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348). - dm-snap: avoid deadock on s->lock when a read is split (bsc#939826). - dm sysfs: introduce ability to add writable attributes (bsc#904348). - drm: Allocate new master object when client becomes master (bsc#956876, bsc#956801). - drm: Fix KABI of 'struct drm_file' (bsc#956876, bsc#956801). - drm/i915: add hotplug activation period to hotplug update mask (bsc#953980). - drm/i915: clean up backlight conditional build (bsc#941113). - drm/i915: debug print on backlight register (bsc#941113). - drm/i915: do full backlight setup at enable time (bsc#941113). - drm/i915: do not save/restore backlight registers in KMS (bsc#941113). - drm/i915: Eliminate lots of WARNs when there's no backlight present (bsc#941113). - drm/i915: fix gen2-gen3 backlight set (bsc#941113,bsc#953971). - drm/i915: Fix gen3 self-refresh watermarks (bsc#953830,bsc#953971). - drm/i915: Fix missing backlight update during panel disablement (bsc#941113). - drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040). - drm/i915: gather backlight information at setup (bsc#941113). - drm/i915: handle backlight through chip specific functions (bsc#941113). - drm/i915: Ignore 'digital output' and 'not HDMI output' bits for eDP detection (bsc#949192). - drm/i915: make asle notifications update backlight on all connectors (bsc#941113). - drm/i915: make backlight info per-connector (bsc#941113). - drm/i915: move backlight level setting in enable/disable to hooks (bsc#941113). - drm/i915: move opregion asle request handling to a work queue (bsc#953826). - drm/i915: nuke get max backlight functions (bsc#941113). - drm/i915/opregion: fix build error on CONFIG_ACPI=n (bsc#953826). - drm/i915: restore backlight precision when converting from ACPI (bsc#941113). - drm/i915/tv: add ->get_config callback (bsc#953830). - drm/i915: use backlight legacy combination mode also for i915gm/i945gm (bsc#941113). - drm/i915: use the initialized backlight max value instead of reading it (bsc#941113). - drm/i915: vlv does not have pipe field in backlight registers (bsc#941113). - fanotify: fix notification of groups with inode & mount marks (bsc#955533). - Fix remove_and_add_spares removes drive added as spare in slot_store (bsc#956717). - genksyms: Handle string literals with spaces in reference files (bsc#958510). - genksyms: Handle string literals with spaces in reference files (bsc#958510). - hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784). in the non-RT kernel to minimize the differences. - ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224). - ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422). - ixgbe: fix broken PFC with X550 (bsc#951864). - ixgbe: use correct fcoe ddp max check (bsc#951864). - kabi: Fix spurious kabi change in mm/util.c. - kABI: protect struct ahci_host_priv. - kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635). - kabi: Restore kabi in struct se_cmd (bsc#954635). - kabi: Restore kabi in struct se_subsystem_api (bsc#954635). - ktime: add ktime_after and ktime_before helper (bsc#904348). - mm: factor commit limit calculation (VM Performance). - mm: get rid of 'vmalloc_info' from /proc/meminfo (VM Performance). - mm: hugetlbfs: skip shared VMAs when unmapping private pages to satisfy a fault (Automatic NUMA Balancing (fate#315482)). - mm: remove PG_waiters from PAGE_FLAGS_CHECK_AT_FREE (bnc#943959). - mm: vmscan: never isolate more pages than necessary (VM Performance). - Move ktime_after patch to the networking section - nfsrdma: Fix regression in NFSRDMA server (bsc#951110). - pci: Drop 'setting latency timer' messages (bsc#956047). - pci: Update VPD size with correct length (bsc#924493). - perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136). - perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136). - perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136). - perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136). - pm, hinernate: use put_page in release_swap_writer (bnc#943959). - rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706). - Re-add copy_page_vector_to_user() - ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711). - route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224). - rpm/constraints.in: Require 14GB worth of disk space on POWER The builds started to fail randomly due to ENOSPC errors. - rpm/kernel-binary.spec.in: Always build zImage for ARM - rpm/kernel-binary.spec.in: Do not explicitly set DEBUG_SECTION_MISMATCH CONFIG_DEBUG_SECTION_MISMATCH is a selectable Kconfig option since 2.6.39 and is enabled in our configs. - rpm/kernel-binary.spec.in: Drop the %build_src_dir macro It is the parent directory of the O= directory. - rpm/kernel-binary.spec.in: really pass down %{?_smp_mflags} - rpm/kernel-binary.spec.in: Use parallel make in all invocations Also, remove the lengthy comment, since we are using a standard rpm macro now. - rpm/kernel-binary.spec.in: Use upstream script to support config.addon - s390/dasd: fix disconnected device with valid path mask (bnc#954986, LTC#132707). - s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#954986, LTC#132706). - s390/dasd: fix list_del corruption after lcu changes (bnc#954986, LTC#133077). - sched: Call select_idle_sibling() when not affine_sd (Scheduler Performance). - sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100). - sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#957395). - sched/numa: Check all nodes when placing a pseudo-interleaved group (Automatic NUMA Balancing (fate#315482)). - sched/numa: Fix math underflow in task_tick_numa() (Automatic NUMA Balancing (fate#315482)). - sched/numa: Only consider less busy nodes as numa balancing destinations (Automatic NUMA Balancing (fate#315482)). - sched: Put expensive runtime debugging checks under a separate Kconfig entry (Scheduler performance). - scsi: hosts: update to use ida_simple for host_no (bsc#939926) - sunrpc/cache: make cache flushing more reliable (bsc#947478). - sunrpc: Fix oops when trace sunrpc_task events in nfs client (bnc#956703). - supported.conf: Support peak_pci and sja1000: These 2 CAN drivers are supported in the RT kernel for a long time so we can also support them - target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666). - target: Send UA upon LUN RESET tmr completion (bsc#933514). - target: use 'se_dev_entry' when allocating UAs (bsc#933514). - Update config files. (bnc#955644) - Update kabi files with sbc_parse_cdb symbol change (bsc#954635). - usbvision fix overflow of interfaces array (bnc#950998). - vmxnet3: adjust ring sizes when interface is down (bsc#950750). - vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750). - x86/efi: Fix invalid parameter error when getting hibernation key (fate#316350, bsc#956284). - x86/evtchn: make use of PHYSDEVOP_map_pirq. - x86/mm: Add parenthesis for TLB tracepoint size calculation (VM Performance (Reduce IPIs during reclaim)). - x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148). - x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148). - x86/tsc: Let high latency PIT fail fast in quick_pit_calibrate() (bsc#953717). - xen: fix boot crash in EC2 settings (bsc#956147). - xen: refresh patches.xen/xen-x86_64-m2p-strict (bsc#956147). - xen: Update Xen patches to 3.12.50. - xfs: always drain dio before extending aio write submission (bsc#949744). - xfs: DIO needs an ioend for writes (bsc#949744). - xfs: DIO write completion size updates race (bsc#949744). - xfs: DIO writes within EOF do not need an ioend (bsc#949744). - xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744). - xfs: do not allocate an ioend for direct I/O completions (bsc#949744). - xfs: factor DIO write mapping from get_blocks (bsc#949744). - xfs: handle DIO overwrite EOF update completion correctly (bsc#949744). - xfs: move DIO mapping size calculation (bsc#949744). - xfs: using generic_file_direct_write() is unnecessary (bsc#949744). - xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165). - xhci: Workaround to get Intel xHCI reset working more reliably (bnc#957546). - zfcp: fix fc_host port_type with NPIV (bnc#954986, LTC#132479).
Patchnames: SUSE-SLE-DESKTOP-12-SP1-2015-985,SUSE-SLE-Live-Patching-12-2015-985,SUSE-SLE-Module-Public-Cloud-12-2015-985,SUSE-SLE-SDK-12-SP1-2015-985,SUSE-SLE-SERVER-12-SP1-2015-985,SUSE-SLE-WE-12-SP1-2015-985
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/758040 self
https://bugzilla.suse.com/814440 self
https://bugzilla.suse.com/904348 self
https://bugzilla.suse.com/921949 self
https://bugzilla.suse.com/924493 self
https://bugzilla.suse.com/926238 self
https://bugzilla.suse.com/933514 self
https://bugzilla.suse.com/936773 self
https://bugzilla.suse.com/939826 self
https://bugzilla.suse.com/939926 self
https://bugzilla.suse.com/940776 self
https://bugzilla.suse.com/941113 self
https://bugzilla.suse.com/941202 self
https://bugzilla.suse.com/943959 self
https://bugzilla.suse.com/944296 self
https://bugzilla.suse.com/947241 self
https://bugzilla.suse.com/947478 self
https://bugzilla.suse.com/949100 self
https://bugzilla.suse.com/949192 self
https://bugzilla.suse.com/949706 self
https://bugzilla.suse.com/949744 self
https://bugzilla.suse.com/949936 self
https://bugzilla.suse.com/950013 self
https://bugzilla.suse.com/950580 self
https://bugzilla.suse.com/950750 self
https://bugzilla.suse.com/950998 self
https://bugzilla.suse.com/951110 self
https://bugzilla.suse.com/951165 self
https://bugzilla.suse.com/951440 self
https://bugzilla.suse.com/951638 self
https://bugzilla.suse.com/951864 self
https://bugzilla.suse.com/952384 self
https://bugzilla.suse.com/952666 self
https://bugzilla.suse.com/953717 self
https://bugzilla.suse.com/953826 self
https://bugzilla.suse.com/953830 self
https://bugzilla.suse.com/953971 self
https://bugzilla.suse.com/953980 self
https://bugzilla.suse.com/954635 self
https://bugzilla.suse.com/954986 self
https://bugzilla.suse.com/955136 self
https://bugzilla.suse.com/955148 self
https://bugzilla.suse.com/955224 self
https://bugzilla.suse.com/955354 self
https://bugzilla.suse.com/955422 self
https://bugzilla.suse.com/955533 self
https://bugzilla.suse.com/955644 self
https://bugzilla.suse.com/956047 self
https://bugzilla.suse.com/956053 self
https://bugzilla.suse.com/956147 self
https://bugzilla.suse.com/956284 self
https://bugzilla.suse.com/956703 self
https://bugzilla.suse.com/956711 self
https://bugzilla.suse.com/956717 self
https://bugzilla.suse.com/956801 self
https://bugzilla.suse.com/956876 self
https://bugzilla.suse.com/957395 self
https://bugzilla.suse.com/957546 self
https://bugzilla.suse.com/958504 self
https://bugzilla.suse.com/958510 self
https://bugzilla.suse.com/958647 self
https://www.suse.com/security/cve/CVE-2015-0272/ self
https://www.suse.com/security/cve/CVE-2015-2925/ self
https://www.suse.com/security/cve/CVE-2015-5156/ self
https://www.suse.com/security/cve/CVE-2015-7799/ self
https://www.suse.com/security/cve/CVE-2015-7872/ self
https://www.suse.com/security/cve/CVE-2015-7990/ self
https://www.suse.com/security/cve/CVE-2015-8215/ self
https://www.suse.com/security/cve/CVE-2015-0272 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/944296 external
https://bugzilla.suse.com/951638 external
https://bugzilla.suse.com/955354 external
https://www.suse.com/security/cve/CVE-2015-2925 external
https://bugzilla.suse.com/926238 external
https://bugzilla.suse.com/951625 external
https://bugzilla.suse.com/951638 external
https://bugzilla.suse.com/963994 external
https://www.suse.com/security/cve/CVE-2015-5156 external
https://bugzilla.suse.com/1091815 external
https://bugzilla.suse.com/1123903 external
https://bugzilla.suse.com/940776 external
https://bugzilla.suse.com/945048 external
https://bugzilla.suse.com/951638 external
https://www.suse.com/security/cve/CVE-2015-7799 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1052256 external
https://bugzilla.suse.com/949936 external
https://bugzilla.suse.com/951638 external
https://www.suse.com/security/cve/CVE-2015-7872 external
https://bugzilla.suse.com/951440 external
https://bugzilla.suse.com/951542 external
https://bugzilla.suse.com/951638 external
https://bugzilla.suse.com/958463 external
https://bugzilla.suse.com/958601 external
https://www.suse.com/security/cve/CVE-2015-7990 external
https://bugzilla.suse.com/945825 external
https://bugzilla.suse.com/952384 external
https://bugzilla.suse.com/953052 external
https://www.suse.com/security/cve/CVE-2015-8215 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1052256 external
https://bugzilla.suse.com/944296 external
https://bugzilla.suse.com/951638 external
https://bugzilla.suse.com/955354 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.51 to receive\nvarious security and bugfixes.\n\nFollowing features were added:\n- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).\n\nFollowing security bugs were fixed:\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux\n  kernel did not validate attempted changes to the MTU value, which allowed\n  context-dependent attackers to cause a denial of service (packet loss)\n  via a value that is (1) smaller than the minimum compliant value or\n  (2) larger than the MTU of an interface, as demonstrated by a Router\n  Advertisement (RA) message that is not validated by a daemon, a different\n  vulnerability than CVE-2015-0272. (bsc#955354)\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c in\n  the Linux kernel attempted to support a FRAGLIST feature without proper\n  memory allocation, which allowed guest OS users to cause a denial of\n  service (buffer overflow and memory corruption) via a crafted sequence\n  of fragmented packets (bnc#940776).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c\n  in the Linux kernel allowed local users to cause a denial of service\n  (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in\n  the Linux kernel did not ensure that certain slot numbers are valid,\n  which allowed local users to cause a denial of service (NULL\n  pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl\n  call (bnc#949936).\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n  kernel did not properly handle rename actions inside a bind mount, which\n  allowed local users to bypass an intended container protection mechanism\n  by renaming a directory, related to a \u0027double-chroot attack (bnc#926238).\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n  creating a connection, preventing possible DoS (bsc#952384).\n\nThe following non-security bugs were fixed:\n- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#954986, LTC#131684).\n- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).\n- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).\n- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).\n- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).\n- audit: correctly record file names with different path name types (bsc#950013).\n- audit: create private file name copies when auditing inodes (bsc#950013).\n- bcache: Add btree_insert_node() (bnc#951638).\n- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).\n- bcache: backing device set to clean after finishing detach (bsc#951638).\n- bcache: backing device set to clean after finishing detach (bsc#951638).\n- bcache: Clean up keylist code (bnc#951638).\n- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).\n- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).\n- bcache: Explicitly track btree node\u0027s parent (bnc#951638).\n- bcache: Fix a bug when detaching (bsc#951638).\n- bcache: Fix a lockdep splat in an error path (bnc#951638).\n- bcache: Fix a shutdown bug (bsc#951638).\n- bcache: Fix more early shutdown bugs (bsc#951638).\n- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- bcache: Insert multiple keys at a time (bnc#951638).\n- bcache: kill closure locking usage (bnc#951638).\n- bcache: Refactor journalling flow control (bnc#951638).\n- bcache: Refactor request_write() (bnc#951638).\n- bcache: Use blkdev_issue_discard() (bnc#951638).\n- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).\n- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).\n- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).\n- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).\n- btrfs: fix condition of commit transaction (bsc#958647).\n- btrfs: fix condition of commit transaction (bsc#958647).\n- btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053).\n- btrfs: Fix out-of-space bug (bsc#958647).\n- btrfs: Fix out-of-space bug (bsc#958647).\n- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).\n- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).\n- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).\n- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).\n- btrfs: fix truncation of compressed and inlined extents (bnc#956053).\n- btrfs: Set relative data on clear btrfs_block_group_cache-\u0026gt;pinned (bsc#958647).\n- btrfs: Set relative data on clear btrfs_block_group_cache-\u003epinned (bsc#958647).\n- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).\n- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).\n- cache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773).\n- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#957395).\n- cxgb4i: Increased the value of MAX_IMM_TX_PKT_LEN from 128 to 256 bytes (bsc#950580).\n- dlm: make posix locks interruptible, (bsc#947241).\n- dmapi: Fix xfs dmapi to not unlock \u0026 lock XFS_ILOCK_EXCL (bsc#949744).\n- dm: do not start current request if it would\u0027ve merged with the previous (bsc#904348).\n- dm: impose configurable deadline for dm_request_fn\u0027s merge heuristic (bsc#904348).\n- dm-snap: avoid deadock on s-\u0026gt;lock when a read is split (bsc#939826).\n- dm sysfs: introduce ability to add writable attributes (bsc#904348).\n- drm: Allocate new master object when client becomes master (bsc#956876, bsc#956801).\n- drm: Fix KABI of \u0027struct drm_file\u0027 (bsc#956876, bsc#956801).\n- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).\n- drm/i915: clean up backlight conditional build (bsc#941113).\n- drm/i915: debug print on backlight register (bsc#941113).\n- drm/i915: do full backlight setup at enable time (bsc#941113).\n- drm/i915: do not save/restore backlight registers in KMS (bsc#941113).\n- drm/i915: Eliminate lots of WARNs when there\u0027s no backlight present (bsc#941113).\n- drm/i915: fix gen2-gen3 backlight set (bsc#941113,bsc#953971).\n- drm/i915: Fix gen3 self-refresh watermarks (bsc#953830,bsc#953971).\n- drm/i915: Fix missing backlight update during panel disablement (bsc#941113).\n- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).\n- drm/i915: gather backlight information at setup (bsc#941113).\n- drm/i915: handle backlight through chip specific functions (bsc#941113).\n- drm/i915: Ignore \u0027digital output\u0027 and \u0027not HDMI output\u0027 bits for eDP detection (bsc#949192).\n- drm/i915: make asle notifications update backlight on all connectors (bsc#941113).\n- drm/i915: make backlight info per-connector (bsc#941113).\n- drm/i915: move backlight level setting in enable/disable to hooks (bsc#941113).\n- drm/i915: move opregion asle request handling to a work queue (bsc#953826).\n- drm/i915: nuke get max backlight functions (bsc#941113).\n- drm/i915/opregion: fix build error on CONFIG_ACPI=n (bsc#953826).\n- drm/i915: restore backlight precision when converting from ACPI (bsc#941113).\n- drm/i915/tv: add -\u0026gt;get_config callback (bsc#953830).\n- drm/i915: use backlight legacy combination mode also for i915gm/i945gm (bsc#941113).\n- drm/i915: use the initialized backlight max value instead of reading it (bsc#941113).\n- drm/i915: vlv does not have pipe field in backlight registers (bsc#941113).\n- fanotify: fix notification of groups with inode \u0026 mount marks (bsc#955533).\n- Fix remove_and_add_spares removes drive added as spare in slot_store (bsc#956717).\n- genksyms: Handle string literals with spaces in reference files (bsc#958510).\n- genksyms: Handle string literals with spaces in reference files (bsc#958510).\n- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).\n  in the non-RT kernel to minimize the differences.\n- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).\n- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).\n- ixgbe: fix broken PFC with X550 (bsc#951864).\n- ixgbe: use correct fcoe ddp max check (bsc#951864).\n- kabi: Fix spurious kabi change in mm/util.c.\n- kABI: protect struct ahci_host_priv.\n- kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635).\n- kabi: Restore kabi in struct se_cmd (bsc#954635).\n- kabi: Restore kabi in struct se_subsystem_api (bsc#954635).\n- ktime: add ktime_after and ktime_before helper (bsc#904348).\n- mm: factor commit limit calculation (VM Performance).\n- mm: get rid of \u0027vmalloc_info\u0027 from /proc/meminfo (VM Performance).\n- mm: hugetlbfs: skip shared VMAs when unmapping private pages to satisfy a fault (Automatic NUMA Balancing (fate#315482)).\n- mm: remove PG_waiters from PAGE_FLAGS_CHECK_AT_FREE (bnc#943959).\n- mm: vmscan: never isolate more pages than necessary (VM Performance).\n- Move ktime_after patch to the networking section\n- nfsrdma: Fix regression in NFSRDMA server (bsc#951110).\n- pci: Drop \u0027setting latency timer\u0027 messages (bsc#956047).\n- pci: Update VPD size with correct length (bsc#924493).\n- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).\n- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).\n- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).\n- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).\n- pm, hinernate: use put_page in release_swap_writer (bnc#943959).\n- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).\n- Re-add copy_page_vector_to_user()\n- ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711).\n- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).\n- rpm/constraints.in: Require 14GB worth of disk space on POWER The builds started to fail randomly due to ENOSPC errors.\n- rpm/kernel-binary.spec.in: Always build zImage for ARM\n- rpm/kernel-binary.spec.in: Do not explicitly set DEBUG_SECTION_MISMATCH CONFIG_DEBUG_SECTION_MISMATCH is a selectable Kconfig option since 2.6.39 and is enabled in our configs.\n- rpm/kernel-binary.spec.in: Drop the %build_src_dir macro It is the parent directory of the O= directory.\n- rpm/kernel-binary.spec.in: really pass down %{?_smp_mflags}\n- rpm/kernel-binary.spec.in: Use parallel make in all invocations Also, remove the lengthy comment, since we are using a standard rpm macro now.\n- rpm/kernel-binary.spec.in: Use upstream script to support config.addon\n- s390/dasd: fix disconnected device with valid path mask (bnc#954986, LTC#132707).\n- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#954986, LTC#132706).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954986, LTC#133077).\n- sched: Call select_idle_sibling() when not affine_sd (Scheduler Performance).\n- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).\n- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#957395).\n- sched/numa: Check all nodes when placing a pseudo-interleaved group (Automatic NUMA Balancing (fate#315482)).\n- sched/numa: Fix math underflow in task_tick_numa() (Automatic NUMA Balancing (fate#315482)).\n- sched/numa: Only consider less busy nodes as numa balancing destinations (Automatic NUMA Balancing (fate#315482)).\n- sched: Put expensive runtime debugging checks under a separate Kconfig entry (Scheduler performance).\n- scsi: hosts: update to use ida_simple for host_no (bsc#939926)\n- sunrpc/cache: make cache flushing more reliable (bsc#947478).\n- sunrpc: Fix oops when trace sunrpc_task events in nfs client (bnc#956703).\n- supported.conf: Support peak_pci and sja1000: These 2 CAN drivers are\n  supported in the RT kernel for a long time so we can also support them\n- target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666).\n- target: Send UA upon LUN RESET tmr completion (bsc#933514).\n- target: use \u0027se_dev_entry\u0027 when allocating UAs (bsc#933514).\n- Update config files. (bnc#955644)\n- Update kabi files with sbc_parse_cdb symbol change (bsc#954635).\n- usbvision fix overflow of interfaces array (bnc#950998).\n- vmxnet3: adjust ring sizes when interface is down (bsc#950750).\n- vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).\n- x86/efi: Fix invalid parameter error when getting hibernation key (fate#316350, bsc#956284).\n- x86/evtchn: make use of PHYSDEVOP_map_pirq.\n- x86/mm: Add parenthesis for TLB tracepoint size calculation (VM Performance (Reduce IPIs during reclaim)).\n- x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148).\n- x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148).\n- x86/tsc: Let high latency PIT fail fast in quick_pit_calibrate() (bsc#953717).\n- xen: fix boot crash in EC2 settings (bsc#956147).\n- xen: refresh patches.xen/xen-x86_64-m2p-strict (bsc#956147).\n- xen: Update Xen patches to 3.12.50.\n- xfs: always drain dio before extending aio write submission (bsc#949744).\n- xfs: DIO needs an ioend for writes (bsc#949744).\n- xfs: DIO write completion size updates race (bsc#949744).\n- xfs: DIO writes within EOF do not need an ioend (bsc#949744).\n- xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744).\n- xfs: do not allocate an ioend for direct I/O completions (bsc#949744).\n- xfs: factor DIO write mapping from get_blocks (bsc#949744).\n- xfs: handle DIO overwrite EOF update completion correctly (bsc#949744).\n- xfs: move DIO mapping size calculation (bsc#949744).\n- xfs: using generic_file_direct_write() is unnecessary (bsc#949744).\n- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165).\n- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#957546).\n- zfcp: fix fc_host port_type with NPIV (bnc#954986, LTC#132479).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-DESKTOP-12-SP1-2015-985,SUSE-SLE-Live-Patching-12-2015-985,SUSE-SLE-Module-Public-Cloud-12-2015-985,SUSE-SLE-SDK-12-SP1-2015-985,SUSE-SLE-SERVER-12-SP1-2015-985,SUSE-SLE-WE-12-SP1-2015-985",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2292-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2015:2292-1",
        "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20152292-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2015:2292-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 758040",
        "url": "https://bugzilla.suse.com/758040"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 814440",
        "url": "https://bugzilla.suse.com/814440"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 904348",
        "url": "https://bugzilla.suse.com/904348"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 921949",
        "url": "https://bugzilla.suse.com/921949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 924493",
        "url": "https://bugzilla.suse.com/924493"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 926238",
        "url": "https://bugzilla.suse.com/926238"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 933514",
        "url": "https://bugzilla.suse.com/933514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 936773",
        "url": "https://bugzilla.suse.com/936773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 939826",
        "url": "https://bugzilla.suse.com/939826"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 939926",
        "url": "https://bugzilla.suse.com/939926"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 940776",
        "url": "https://bugzilla.suse.com/940776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 941113",
        "url": "https://bugzilla.suse.com/941113"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 941202",
        "url": "https://bugzilla.suse.com/941202"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 943959",
        "url": "https://bugzilla.suse.com/943959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 944296",
        "url": "https://bugzilla.suse.com/944296"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 947241",
        "url": "https://bugzilla.suse.com/947241"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 947478",
        "url": "https://bugzilla.suse.com/947478"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 949100",
        "url": "https://bugzilla.suse.com/949100"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 949192",
        "url": "https://bugzilla.suse.com/949192"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 949706",
        "url": "https://bugzilla.suse.com/949706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 949744",
        "url": "https://bugzilla.suse.com/949744"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 949936",
        "url": "https://bugzilla.suse.com/949936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 950013",
        "url": "https://bugzilla.suse.com/950013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 950580",
        "url": "https://bugzilla.suse.com/950580"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 950750",
        "url": "https://bugzilla.suse.com/950750"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 950998",
        "url": "https://bugzilla.suse.com/950998"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 951110",
        "url": "https://bugzilla.suse.com/951110"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 951165",
        "url": "https://bugzilla.suse.com/951165"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 951440",
        "url": "https://bugzilla.suse.com/951440"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 951638",
        "url": "https://bugzilla.suse.com/951638"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 951864",
        "url": "https://bugzilla.suse.com/951864"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 952384",
        "url": "https://bugzilla.suse.com/952384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 952666",
        "url": "https://bugzilla.suse.com/952666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 953717",
        "url": "https://bugzilla.suse.com/953717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 953826",
        "url": "https://bugzilla.suse.com/953826"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 953830",
        "url": "https://bugzilla.suse.com/953830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 953971",
        "url": "https://bugzilla.suse.com/953971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 953980",
        "url": "https://bugzilla.suse.com/953980"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 954635",
        "url": "https://bugzilla.suse.com/954635"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 954986",
        "url": "https://bugzilla.suse.com/954986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 955136",
        "url": "https://bugzilla.suse.com/955136"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 955148",
        "url": "https://bugzilla.suse.com/955148"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 955224",
        "url": "https://bugzilla.suse.com/955224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 955354",
        "url": "https://bugzilla.suse.com/955354"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 955422",
        "url": "https://bugzilla.suse.com/955422"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 955533",
        "url": "https://bugzilla.suse.com/955533"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 955644",
        "url": "https://bugzilla.suse.com/955644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956047",
        "url": "https://bugzilla.suse.com/956047"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956053",
        "url": "https://bugzilla.suse.com/956053"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956147",
        "url": "https://bugzilla.suse.com/956147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956284",
        "url": "https://bugzilla.suse.com/956284"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956703",
        "url": "https://bugzilla.suse.com/956703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956711",
        "url": "https://bugzilla.suse.com/956711"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956717",
        "url": "https://bugzilla.suse.com/956717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956801",
        "url": "https://bugzilla.suse.com/956801"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956876",
        "url": "https://bugzilla.suse.com/956876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 957395",
        "url": "https://bugzilla.suse.com/957395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 957546",
        "url": "https://bugzilla.suse.com/957546"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 958504",
        "url": "https://bugzilla.suse.com/958504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 958510",
        "url": "https://bugzilla.suse.com/958510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 958647",
        "url": "https://bugzilla.suse.com/958647"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0272 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0272/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2925 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2925/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-5156 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-5156/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7799 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7799/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7872 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7872/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7990 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7990/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8215 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8215/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2015-12-17T12:08:13Z",
      "generator": {
        "date": "2015-12-17T12:08:13Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2015:2292-1",
      "initial_release_date": "2015-12-17T12:08:13Z",
      "revision_history": [
        {
          "date": "2015-12-17T12:08:13Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-3.12.51-60.20.2.noarch",
                "product": {
                  "name": "kernel-devel-3.12.51-60.20.2.noarch",
                  "product_id": "kernel-devel-3.12.51-60.20.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-3.12.51-60.20.2.noarch",
                "product": {
                  "name": "kernel-macros-3.12.51-60.20.2.noarch",
                  "product_id": "kernel-macros-3.12.51-60.20.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.12.51-60.20.2.noarch",
                "product": {
                  "name": "kernel-source-3.12.51-60.20.2.noarch",
                  "product_id": "kernel-source-3.12.51-60.20.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-3.12.51-60.20.2.noarch",
                "product": {
                  "name": "kernel-docs-3.12.51-60.20.2.noarch",
                  "product_id": "kernel-docs-3.12.51-60.20.2.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-obs-build-3.12.51-60.20.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-3.12.51-60.20.1.ppc64le",
                  "product_id": "kernel-obs-build-3.12.51-60.20.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-3.12.51-60.20.2.ppc64le",
                "product": {
                  "name": "kernel-default-3.12.51-60.20.2.ppc64le",
                  "product_id": "kernel-default-3.12.51-60.20.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.51-60.20.2.ppc64le",
                "product": {
                  "name": "kernel-default-base-3.12.51-60.20.2.ppc64le",
                  "product_id": "kernel-default-base-3.12.51-60.20.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le",
                "product": {
                  "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le",
                  "product_id": "kernel-default-devel-3.12.51-60.20.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.51-60.20.2.ppc64le",
                "product": {
                  "name": "kernel-syms-3.12.51-60.20.2.ppc64le",
                  "product_id": "kernel-syms-3.12.51-60.20.2.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-obs-build-3.12.51-60.20.1.s390x",
                "product": {
                  "name": "kernel-obs-build-3.12.51-60.20.1.s390x",
                  "product_id": "kernel-obs-build-3.12.51-60.20.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-3.12.51-60.20.2.s390x",
                "product": {
                  "name": "kernel-default-3.12.51-60.20.2.s390x",
                  "product_id": "kernel-default-3.12.51-60.20.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.51-60.20.2.s390x",
                "product": {
                  "name": "kernel-default-base-3.12.51-60.20.2.s390x",
                  "product_id": "kernel-default-base-3.12.51-60.20.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.51-60.20.2.s390x",
                "product": {
                  "name": "kernel-default-devel-3.12.51-60.20.2.s390x",
                  "product_id": "kernel-default-devel-3.12.51-60.20.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-3.12.51-60.20.2.s390x",
                "product": {
                  "name": "kernel-default-man-3.12.51-60.20.2.s390x",
                  "product_id": "kernel-default-man-3.12.51-60.20.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.51-60.20.2.s390x",
                "product": {
                  "name": "kernel-syms-3.12.51-60.20.2.s390x",
                  "product_id": "kernel-syms-3.12.51-60.20.2.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-default-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-default-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-default-devel-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-default-devel-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-default-extra-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-default-extra-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-syms-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-syms-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-xen-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-xen-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-xen-devel-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
                "product": {
                  "name": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
                  "product_id": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
                "product": {
                  "name": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
                  "product_id": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-ec2-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-ec2-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-devel-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-ec2-devel-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-ec2-devel-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-extra-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-ec2-extra-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-ec2-extra-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-3.12.51-60.20.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-3.12.51-60.20.1.x86_64",
                  "product_id": "kernel-obs-build-3.12.51-60.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-default-base-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-default-base-3.12.51-60.20.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-base-3.12.51-60.20.2.x86_64",
                "product": {
                  "name": "kernel-xen-base-3.12.51-60.20.2.x86_64",
                  "product_id": "kernel-xen-base-3.12.51-60.20.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Desktop 12 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Desktop 12 SP1",
                  "product_id": "SUSE Linux Enterprise Desktop 12 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sled:12:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12",
                  "product_id": "SUSE Linux Enterprise Live Patching 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 12",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 12",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP1",
                  "product_id": "SUSE Linux Enterprise Server 12 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12 SP1",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12:sp1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-devel-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-extra-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-devel-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-macros-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-source-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-syms-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-xen-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
          "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64"
        },
        "product_reference": "kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
          "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64"
        },
        "product_reference": "kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-ec2-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-ec2-devel-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-extra-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-ec2-extra-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-docs-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-3.12.51-60.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-3.12.51-60.20.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-3.12.51-60.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x"
        },
        "product_reference": "kernel-obs-build-3.12.51-60.20.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-3.12.51-60.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64"
        },
        "product_reference": "kernel-obs-build-3.12.51-60.20.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le"
        },
        "product_reference": "kernel-default-3.12.51-60.20.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-default-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le"
        },
        "product_reference": "kernel-default-base-3.12.51-60.20.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-default-base-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-base-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-3.12.51-60.20.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-default-devel-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-devel-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-default-man-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-devel-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-macros-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-source-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le"
        },
        "product_reference": "kernel-syms-3.12.51-60.20.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-syms-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-syms-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-xen-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-xen-base-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
          "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le"
        },
        "product_reference": "kernel-default-3.12.51-60.20.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-default-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le"
        },
        "product_reference": "kernel-default-base-3.12.51-60.20.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-default-base-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-base-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-3.12.51-60.20.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-default-devel-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-devel-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-default-man-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-devel-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-macros-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.12.51-60.20.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch"
        },
        "product_reference": "kernel-source-3.12.51-60.20.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.51-60.20.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le"
        },
        "product_reference": "kernel-syms-3.12.51-60.20.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.51-60.20.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x"
        },
        "product_reference": "kernel-syms-3.12.51-60.20.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-syms-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-xen-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-xen-base-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-3.12.51-60.20.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
        },
        "product_reference": "kernel-default-extra-3.12.51-60.20.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-0272",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0272"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0272",
          "url": "https://www.suse.com/security/cve/CVE-2015-0272"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-0272",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 944296 for CVE-2015-0272",
          "url": "https://bugzilla.suse.com/944296"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-0272",
          "url": "https://bugzilla.suse.com/951638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 955354 for CVE-2015-0272",
          "url": "https://bugzilla.suse.com/955354"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-12-17T12:08:13Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-0272"
    },
    {
      "cve": "CVE-2015-2925",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2925"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2925",
          "url": "https://www.suse.com/security/cve/CVE-2015-2925"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 926238 for CVE-2015-2925",
          "url": "https://bugzilla.suse.com/926238"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951625 for CVE-2015-2925",
          "url": "https://bugzilla.suse.com/951625"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-2925",
          "url": "https://bugzilla.suse.com/951638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 963994 for CVE-2015-2925",
          "url": "https://bugzilla.suse.com/963994"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-12-17T12:08:13Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2925"
    },
    {
      "cve": "CVE-2015-5156",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-5156"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-5156",
          "url": "https://www.suse.com/security/cve/CVE-2015-5156"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2015-5156",
          "url": "https://bugzilla.suse.com/1091815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123903 for CVE-2015-5156",
          "url": "https://bugzilla.suse.com/1123903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 940776 for CVE-2015-5156",
          "url": "https://bugzilla.suse.com/940776"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 945048 for CVE-2015-5156",
          "url": "https://bugzilla.suse.com/945048"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-5156",
          "url": "https://bugzilla.suse.com/951638"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-12-17T12:08:13Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-5156"
    },
    {
      "cve": "CVE-2015-7799",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7799"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7799",
          "url": "https://www.suse.com/security/cve/CVE-2015-7799"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-7799",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1052256 for CVE-2015-7799",
          "url": "https://bugzilla.suse.com/1052256"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 949936 for CVE-2015-7799",
          "url": "https://bugzilla.suse.com/949936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-7799",
          "url": "https://bugzilla.suse.com/951638"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-12-17T12:08:13Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-7799"
    },
    {
      "cve": "CVE-2015-7872",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7872"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7872",
          "url": "https://www.suse.com/security/cve/CVE-2015-7872"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951440 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/951440"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951542 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/951542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/951638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 958463 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/958463"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 958601 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/958601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-12-17T12:08:13Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-7872"
    },
    {
      "cve": "CVE-2015-7990",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7990"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7990",
          "url": "https://www.suse.com/security/cve/CVE-2015-7990"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 945825 for CVE-2015-7990",
          "url": "https://bugzilla.suse.com/945825"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 952384 for CVE-2015-7990",
          "url": "https://bugzilla.suse.com/952384"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 953052 for CVE-2015-7990",
          "url": "https://bugzilla.suse.com/953052"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-12-17T12:08:13Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-7990"
    },
    {
      "cve": "CVE-2015-8215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8215",
          "url": "https://www.suse.com/security/cve/CVE-2015-8215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1052256 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/1052256"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 944296 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/944296"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/951638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 955354 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/955354"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-1-4.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-1-4.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.51-60.20.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.51-60.20.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.51-60.20.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.51-60.20.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-12-17T12:08:13Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-8215"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…